Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström, Analyzing the Effectiveness of Attack Countermeasures in a SCADA System, 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, April 2017.

P. Johnsson, D. Gorton, R.Lagerström, and M. Ekstedt, Time between Vulnerability Disclosures: A Measure of Software Product Vulnerability, Computers and Security, Volume 62, Elsevier, September 2016. dx.doi.org/10.1016/j.cose.2016.08.004

Gundars Kalns, Simin Nadjm-Tehrani, and Maria Vasilevskaya, Trading off Latency against Security in Open Energy Metering Infrastructures, in proceedings of the 4th International Symposium for ICS and SCADA Cyber Security Research, August 2016.  dx.doi.org/10.14236/ewic/ICS2016.17, available as PDF.

P. Johnson, M. Ekstedt and R. Lagerström, Automatic Probabilistic Enterprise IT ArchitectureModeling: a Dynamic Bayesian Networks Approach, in Proceedings of the 20th IEEE International Enterprise Distributed Object Computing Conference Workshops, IEEE, 2016.

P. Johnson, A. Vernotte, M. Ekstedt and R. Lagerström, pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach, in Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), IEEE, 2016.

V. Gulisano, V. Tudor, M. Almgren, and M. Papatriantafilou, BES – Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016. doi>10.1145/2899015.2899021

V. Tudor, M. Almgren, and M. Papatriantafilou, Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data, in Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC), IEEE, 2016.

R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi, and M. Ekstedt, Exploiting Bro for Intrusion Detection in a SCADA System, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016.  doi>10.1145/2899015.2899028, available as PDF.

M. Asplund and S. Nadjm-Tehrani, Attitudes and perceptions of IoT security in critical societal services, IEEE Access, 2016. doi:10.1109/ACCESS.2016.2560919. Available as PDF.

O. Somarriba, U. Zurutuza, R. Uribeetxeberria, L. Delosiéres, and S. Nadjm-Tehrani, Detection and Visualization of Android Malware Behavior, Journal of Electrical and Computer Engineering, Hindawi, 2016.  dx.doi.org/10.1155/2016/8034967

M. Vasilevskaya, Security in Embedded Systems: A Model-Based Approach with Risk Metrics, PhD Thesis, number 1715, Linköping University, December 2015.

M. Vasilevskaya and S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, in International Conference on Computer Safety, Reliability and Security (SAFECOMP), Springer, September 2015. doi:10.1007/978-3-319-24255-2_25. Available as PDF.