Magnus Almgren
More details on personal website:
Showing 86 publications
A SURVEY OF RECENT AUTOMOTIVE SOFTWARE SECURITY VULNERABILITIES: TRENDS AND ATTACK VECTORS
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy
Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle
CPSIoTSec 23: Workshop Chairs Welcome
Clipaha: A Scheme to Perform Password Stretching on the Client
Evaluation of Open-Source Tools for Differential Privacy
Gridchain: an investigation of privacy for the future local distribution grid
MicroTL: Transfer Learning on Low-Power IoT Devices
MiniLearn: On-Device Learning for Low-Power IoT Devices
Performance of deep neural networks on low-power IoT devices
Proposing HEAVENS 2.0 – an automotive risk assessment model
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads
BES: Differentially Private Event Aggregation for large-scale IoT-based Systems
Intrusion Detection in Industrial Networks via Data Streaming
A Scalable Specification-Agnostic Multi-Sensor Anomaly Detection System for IIoT Environments
AUTOSAR Embedded Security in Vehicles
TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices
Delegation sketch: A parallel design with support for fast and accurate concurrent operations
Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs
IoTLogBlock: Recording Off-line Transactions of Low-Power IoT Devices Using a Blockchain
Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids
Continuous Monitoring meets Synchronous Transmissions and In-Network Aggregation
Understanding Common Automotive Security Issues and Their Implications
Performance of Secure Boot in Embedded Systems
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
RICS-el: Building a national testbed for research and training on SCADA security (short paper)
Analysis of door openings of refrigerated display cabinets in an operational supermarket
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems
eChIDNA: Continuous Data Validation in Advanced Metering Infrastructures
Data Modelling for Predicting Exploits
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs
Geometric Monitoring in Action: a Systems Perspective for the Internet of Things
Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization
Adapting Threat Modeling Methods for the Automotive Industry
Detecting Non-Technical Energy Losses through Structural Periodic Patterns in AMI data
BES - Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures
Harnessing the unknown in advanced metering infrastructure traffic
Online and scalable data validation in advanced metering infrastructures
A study on data de-pseudonymization in the smart grid
METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
Detection of intrusions and malware, and vulnerability assessment
T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols
Cybersecurity and Data Management in the Smart Grid
Online Temporal-Spatial Analysis for Detection of Critical Events in Cyber-Physical Systems
METIS: A two-tier intrusion detection system for advanced metering infrastructures
When Smart Cities meet Big Data
Managing your Trees: Insights from a Metropolitan-Scale Low-Power Wireless Network
Analysis of the Impact of Data Granularity on Privacy for the Smart Grid
Managing your Trees: Insights from a Metropolitan-Scale Low-Power Wireless Network
Algorithms and Data Handling Towards Adaptive and Robust Electricity Networks
Cybersecurity in the Smart Grid
Seventh European Conference on Computer Network Defence (EC2ND)
Tracking Malicious Hosts on a 10Gbps Backbone Link
Remote control of smart meters: friend or foe?
Emerging and Future Cyber Threats to Critical Systems
Mapping Systems Security Research at Chalmers
On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
FORWARD -- Second Workshop Report
Security Arena, årsrapport 2008
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
A Multi-Sensor Model to Improve Automated Attack Detection
A Comparison of Alternative Audit Sources for Web Server Attack Detection
Tuning an IDS - Learning the User's Preferences
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Using Active Learning in Intrusion Detection
Implications of IDS Classification on Attack Detection
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.
Showing 8 research projects
Big Data Processing in the context of Smart Buildings,
Resilient Information and Control Systems (RICS)
Development and adoption of modern methods for effective learning of computer security
Examine –Extracting useful information out of data in AMI networking
Big Data and Internet of Things for the Sustainable Living in the Future City
Algorithms for adaptiveness and robustness in electricity networks
CRitical Infrastructure Security AnaLysIS (CRISALIS)