Magnus Almgren
More details on personal website:
Visar 86 publikationer
A SURVEY OF RECENT AUTOMOTIVE SOFTWARE SECURITY VULNERABILITIES: TRENDS AND ATTACK VECTORS
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy
Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle
CPSIoTSec 23: Workshop Chairs Welcome
Clipaha: A Scheme to Perform Password Stretching on the Client
Evaluation of Open-Source Tools for Differential Privacy
Gridchain: an investigation of privacy for the future local distribution grid
MicroTL: Transfer Learning on Low-Power IoT Devices
MiniLearn: On-Device Learning for Low-Power IoT Devices
Performance of deep neural networks on low-power IoT devices
Proposing HEAVENS 2.0 – an automotive risk assessment model
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads
BES: Differentially Private Event Aggregation for large-scale IoT-based Systems
Intrusion Detection in Industrial Networks via Data Streaming
A Scalable Specification-Agnostic Multi-Sensor Anomaly Detection System for IIoT Environments
AUTOSAR Embedded Security in Vehicles
TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices
Delegation sketch: A parallel design with support for fast and accurate concurrent operations
Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs
IoTLogBlock: Recording Off-line Transactions of Low-Power IoT Devices Using a Blockchain
Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids
Continuous Monitoring meets Synchronous Transmissions and In-Network Aggregation
Understanding Common Automotive Security Issues and Their Implications
Performance of Secure Boot in Embedded Systems
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
RICS-el: Building a national testbed for research and training on SCADA security (short paper)
Analysis of door openings of refrigerated display cabinets in an operational supermarket
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems
The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems
eChIDNA: Continuous Data Validation in Advanced Metering Infrastructures
Data Modelling for Predicting Exploits
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs
Geometric Monitoring in Action: a Systems Perspective for the Internet of Things
Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization
Adapting Threat Modeling Methods for the Automotive Industry
Detecting Non-Technical Energy Losses through Structural Periodic Patterns in AMI data
BES - Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures
Harnessing the unknown in advanced metering infrastructure traffic
Online and scalable data validation in advanced metering infrastructures
A study on data de-pseudonymization in the smart grid
METIS: a Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
Detection of intrusions and malware, and vulnerability assessment
T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols
Cybersecurity and Data Management in the Smart Grid
Online Temporal-Spatial Analysis for Detection of Critical Events in Cyber-Physical Systems
METIS: A two-tier intrusion detection system for advanced metering infrastructures
When Smart Cities meet Big Data
Managing your Trees: Insights from a Metropolitan-Scale Low-Power Wireless Network
Analysis of the Impact of Data Granularity on Privacy for the Smart Grid
Managing your Trees: Insights from a Metropolitan-Scale Low-Power Wireless Network
Algorithms and Data Handling Towards Adaptive and Robust Electricity Networks
Cybersecurity in the Smart Grid
Seventh European Conference on Computer Network Defence (EC2ND)
Tracking Malicious Hosts on a 10Gbps Backbone Link
Remote control of smart meters: friend or foe?
Emerging and Future Cyber Threats to Critical Systems
Mapping Systems Security Research at Chalmers
On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links
Security Arena, årsrapport 2009
Forward White Book: Emerging ICT Threats
FORWARD -- Second Workshop Report
Security Arena, årsrapport 2008
Investigating the Benefits of Using Multiple Intrusion-Detection Sensors
A Multi-Sensor Model to Improve Automated Attack Detection
A Comparison of Alternative Audit Sources for Web Server Attack Detection
Tuning an IDS - Learning the User's Preferences
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004
Using Active Learning in Intrusion Detection
Implications of IDS Classification on Attack Detection
Ladda ner publikationslistor
Du kan ladda ner denna lista till din dator.
Filtrera och ladda ner publikationslista
Som inloggad användare hittar du ytterligare funktioner i MyResearch.
Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:
Zotero Connector
Mendeley Web Importer
Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.
Visar 17 forskningsprojekt
MAGIC: Möta fordonsindustrins ansvarsutmaningar med tillförlitlig digital forensik
Mot en säkerhetsvision för flera lager för transportsystem i 6G-eran
RICS2: Säkra IT-system för drift och övervakning av samhällskritisk infrastruktur
INDEED: Information and Data-processing in Focus for Energy Efficiency
RIOT: Ett resilient sakernas internet
KIDSAM: Kunskap- och informationssdelning i digitala samverkansprojekt
Big Data Processing in the context of Smart Buildings,
Säkra IT-system för drift och övervakning av samhällskritisk infrastruktur
Utveckling och anpassning av modern metodik för effektivt lärande av datasäkerhet
Examine –- Extracting useful information out of data in AMI networking
Storskalig dataanalys från Internet of Things för att möjliggöra framtidens hållbara stad
Utvecklande av dataalgoritmer för nätverk för att stärka anpassningsbarhet och robusthet i elnät
CRitical Infrastructure Security AnaLysIS (CRISALIS)