Daniel Pereira, Celso Hirata, Simin Nadjm-Tehrani, A STAMP-based ontology approach to support Safety and Security Analyses, Journal of Information Security and Applications, Elsevier, 2019.

S. Bergman, A. Asplund, S. Nadjm-Tehrani, Permissioned Blockchains and Distributed Databases: A Performance Study, Concurrency and Computation, Practice and Experience, 2019. Available as pdf.

M. Almgren, W. Aoudi, R. Gustafsson, R. Krahl, A. Lindhe, The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems, in Proceedings of the  4th Annual Industrial Control System Security (ICSS) Workshop at 2018 Annual Computer Security Applications Conference, December 2018. DOI: 10.1145/3295453.3295456

A. Iqbal, F. Mahmood, A. Shalaginov, M. Ekstedt, Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems, in Proceedings of International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, part of IEEE International Conference on Big Data (BigData),  December 2018. https://doi.org/10.1109/BigData.2018.8622550

A. Iqbal, A. Shalaginov, F. Mahmood, Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks, in Proceedings of International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, part of IEEE International Conference on Big Data (BigData), December 2018. https://doi.org/10.1109/BigData.2018.8622220

A. Iqbal, F. Mahmood and M. Ekstedt, An Experimental Forensic Test bed: Attack-based Digital Forensic Analysis of WAMPAC Applications, In Proceedings of the Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MedPower 2018), Dubrovnik, Croatia. November 2018.

A. Reinthal, E. Lef Filippakis, M. AlmgrenData, Modelling for Predicting Exploits,In Proceedings of the 23rd Nordic Conference on Secure IT Systems (NordSec), Lecture Notes in Computer Science, Vol. 11252, November 2018.

C. Stylianopoulos, L. Johansson, O. Olsson et al, CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs, In Proceedings of the 23rd Nordic Conference on Secure IT Systems (NordSec), Lecture Notes in Computer Science,Vol. 11252, November 2018.

W. Aoudi, M. Iturbe, M. Almgren, Truth Will Out, Departure-based Process-Level Detection of Stealthy Attacks on Control Systems, in Proceedings of the ACM conference on Computer and Communication Security (CCS), October 2018.  DOI: 10.1145/3243734.3243781

M. Almgren, P. Andersson, G. Björkman, M. Ekstedt, J. Hallberg, S. Nadjm-Tehrani, E. Westring, RICS-el: Building a National Testbed for Research and Training on SCADA Security, in Proceedings of 13th International Conference on Critical Information Infrastructure Security (CRITIS), September 2018, Available as pdf.

A. Lautenbach, M. Almgren, T. Olovsson, Understanding Common Automotive Security Issues and their Implications, in Proceedings for workshop on Interplay between Security, Safety and System/Software Architecture (ISSA),  September 2018.

P. Johnson, R. Lagerström, and M. Ekstedt, A Meta Language for Threat Modeling and Attack Simulations, in Proceedings of  the 14th International Conference on Availability, Reliability and Security (ARES), August 2018. DOI: https://doi.org/10.1145/3230833.3232799

R. Terruggia, G. Dondossola and M. Ekstedt, Cyber security analysis of Web-of-Cells energy architectures, in Proceedings of the 5th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR), August 2018. DOI: https://dx.doi.org/10.14236/ewic/ICS2018.5

A. Vernotte,  M. Välja, M. Korman, G. Björkman, M. Ekstedt, and R. Lagerström. Load balancing of renewable energy: a cyber security analysis, Energy Informatics, no. 1 (5), July 2018. DOI: https://doi.org/10.1186/s42162-018-0010-x

V. Tudor, M. Almgren, M. Papatriantafilou, The influence of dataset characteristics on privacy preserving methods in the Advanced Metering Infrastructure, Computers and Security, Volume 76, July 2018. https://doi.org/10.1016/j.cose.2018.02.012

V. Tudor, V. Gulisano, M. Almgren, M. Papatriantafilou, BES: Differentially Private Event Aggregation for Large-scale IoT-based Systems, Future Generation Computer Systems, July 2018.

C.-Y. Lin and S. Nadjm-Tehrani, Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks, in Proceedings of the 4th ACM Cyber-Physical System Security Workshop (CPSS) at AsiaCCS, ACM, June 2018. doi>10.1145/3198458.3198460, Available as  pdf.

C. Stylianopoulos, Parallel and Distributed Processing in the Context of Fog Computing: High Throughput Pattern Matching and Distributed Monitoring, Licentiate Degree, Chalmers, June 2018. Available as pdf.

J. van Rooij, J. Swetzén, V. Gulisano, M. Almgren, M. Papatriantafilou, eChIDNA: Continuous Data Validation in Advanced Metering Infrastructures, In proceedings of the 2018, IEEE International Energy Conference (ENERGYCON), IEEE, June 2018.

M. Asplund, J. Lövhall, S. Nadjm-Tehrani, In-store Payments using Bitcoin, In Proceedings of International Workshop on Blockchains and Smart Contracts (BSC), IEEE, February 2018. Available as pdf.

A. Iqbal, M. Ekstedt, H. Alobaidli, Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector in Proceedings of International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, part of IEEE International Conference on Big Data (BigData), December 2017. DOI: 10.1109/BigData.2017.8258360

A. Karahasanovic, P. Kleberger, M. Almgren, Adapting Threat Modeling Methods for the Automotive Industry, Presented at the Embedded Security in Cars (ESCAR), November 2017. Available as pdf.

A. Lautenbach, M. Almgren, T. Olovsson, What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems, in Proceedings of the 12th International Conference on Critical Information Infrastructure Security (CRITIS), Springer, October 2017. Available as pdf.

C.-Y. Lin, S. Nadjm-Tehrani, and M. Asplund, Timing-based Anomaly Detection in SCADA networks, in Proceedings of 12th International Conference on Critical Information Infrastructures Security (CRITIS), Springer, October 2017. DOI: https://doi.org/10.1007/978-3-319-99843-5_5 , Available as pdf.

A. Iqbal, M. Ekstedt, H. Alobaidli, Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector. Book Chapter In: Digital Forensics and Cyber Crime (ICDF2C). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, LNICST series Springer. October 2017. DOI: https://doi.org/10.1007/978-3-319-73697-6_9

D. Pereira, C. Hirata, R. Pagliares, and S. Nadjm-Tehrani, Towards Combined Safety and Security Constraints Analysis, in Proceedings of the 5th International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE), SAFECOMP workshop, Lecture Notes in Computer Science Volume 10489, Springer, September 2017.  DOI: 10.1007/978-3-319-66284-8_7

C. Stylianopoulos, M. Almgren, O. Landsiedel and M. Papatriantafilou, Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization, in Proceedings of the 46th International Conference on Parallel Processing (ICPP-2017), IEEE, August 2017. DOI: dx.doi.org/10.1109/ICPP.2017.56

V. Tudor, Enhancing Privacy in the Advanced Metering Infrastructure: Efficient Methods, the Role of Data Characteristics and Applications, Doctoral thesis, 2017, ISBN: 978-91-7597-632-7, Chalmers serie: 4313.

M. Korman, M. Välja, G. Björkman, M. Ekstedt, A. Vernotte, R. Lagerström, Analyzing the Effectiveness of Attack Countermeasures in a SCADA System, In Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPS week), ACM,  April 2017. DOI: 10.1145/3055386.3055393

P. Johnsson, D. Gorton, R.Lagerström, and M. Ekstedt, Time between Vulnerability Disclosures: A Measure of Software Product Vulnerability, Computers and Security, Volume 62, Elsevier, September 2016. dx.doi.org/10.1016/j.cose.2016.08.004

V. Botev, M. Almgren, V. Gulisano, O. Landsiedel, M, Papatrianfilou, J. van Rooij, Detecting non-technical losses through structural periodic patterns in AMI data, in Proceedings of International Conference on Bog Data (BigData), IEEE, December 2016.  dx.doi.org/10.1109/BigData.2016.7840967

P. Johnsson, M. Ekstedt, R. Lagerström, Automatic Probablistic Enterprise IT Architecture Modelling: A Dynamic Bayesian Networks Approach, in Proceedings of the 20th International Enterprise Distributed Object Computing Conference Workshops, IEEE, September 2016. DOI: 10.1109/EDOCW.2016.7584351

P. Johnson, A. Vernotte, M. Ekstedt and R. Lagerström, pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach, in Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), IEEE, September 2016. DOI: 10.1109/ARES.2016.77

G. Kalns, S. Nadjm-Tehrani, M. Vasilevskaya, Trading off Latency against Security in Open Energy Metering Infrastructures, in Proceedings of the 4th International Symposium for ICS and SCADA Cyber Security Research, August 2016. dx.doi.org/10.14236/ewic/ICS2016.17

V. Gulisano, V. Tudor, M. Almgren, and M. Papatriantafilou, BES – Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016.

V. Tudor, M. Almgren, and M. Papatriantafilou, Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data, in Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC), IEEE, 2016. dx.doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0076

R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi, and M. Ekstedt, Exploiting Bro for Intrusion Detection in a SCADA System, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016.  doi>10.1145/2899015.2899028, available as PDF.

M. Asplund and S. Nadjm-Tehrani, Attitudes and perceptions of IoT security in critical societal services, IEEE Access, 2016. doi:10.1109/ACCESS.2016.2560919. Available as PDF.

O. Somarriba, U. Zurutuza, R. Uribeetxeberria, L. Delosiéres, and S. Nadjm-Tehrani, Detection and Visualization of Android Malware Behavior, Journal of Electrical and Computer Engineering, Hindawi, 2016.  dx.doi.org/10.1155/2016/8034967

M. Vasilevskaya, Security in Embedded Systems: A Model-Based Approach with Risk Metrics, PhD Thesis, number 1715, Linköping University, December 2015.

M. Vasilevskaya and S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, in International Conference on Computer Safety, Reliability and Security (SAFECOMP), Springer, September 2015. doi:10.1007/978-3-319-24255-2_25. Available as PDF.