SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Brax Christoffer) "

Sökning: WFRF:(Brax Christoffer)

  • Resultat 1-37 av 37
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Atif, Yacine, 1967-, et al. (författare)
  • Cyber-threat analysis for Cyber-Physical Systems : Technical report for Package 4, Activity 3 of ELVIRA project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.
  •  
2.
  • Atif, Yacine, 1967-, et al. (författare)
  • Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
  • 2017
  • Konferensbidrag (refereegranskat)abstract
    • Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 
  •  
3.
  • Atif, Yacine, 1967-, et al. (författare)
  • Multi-agent Systems for Power Grid Monitoring : Technical report for Package 4.1 of ELVIRA project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 
  •  
4.
  • Brax, Christoffer, et al. (författare)
  • A Study of Anomaly Detection in Data from Urban Sensor Networks
  • 2012
  • Ingår i: Modeling Decisions for Artificial Intelligence. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783642341694 - 9783642346200 ; , s. 185-196
  • Konferensbidrag (refereegranskat)abstract
    • In many sensor systems used in urban environments, the amount of data produced can be vast. To aid operators of such systems, high-level information fusion can be used for automatically analyzing the surveillance information. In this paper an anomaly detection approach for finding areas with traffic patterns that deviate from what is considered normal is evaluated. The use of such approaches could help operators in identifying areas with an increased risk for ambushes  or improvised explosive devices (IEDs).
  •  
5.
  • Brax, Christoffer, et al. (författare)
  • An approach for increased supply chain security by using automatic detection of anomalous vehicle behavior
  • 2009
  • Ingår i: CD-ROM Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2009). - 9788400088514 ; , s. 165-176
  • Konferensbidrag (refereegranskat)abstract
    • In recent years, the development of low-cost GPS transceivers has made it possible to equip all trucks in a fleet with equipment for automatically reporting the status of the trucks to a fleet management system. The downside is that the huge amount of information that is gathered must be evaluated in real-time by an operator. We propose the use of a data-driven anomaly detection algorithm that learns "normal" vehicle behaviour and detects anomalous behaviour such as smuggling, accidents and hijacking, The algorithm is evaluated on real-world data from trucks and commuters equipped with GPS transceivers. The results give initial support to the claim that anomaly detection based on statistical learning can be used to support human descision making. This ability can increase supply chain security by alerting an operator on anomalous vehicle behaviour.
  •  
6.
  • Brax, Christoffer, et al. (författare)
  • An ensemble approach for increased anomaly detection performance in video surveillance data
  • 2009
  • Ingår i: Proceedings of the 12th International Conference on Information Fusion (FUSION 2009), Seattle, Washington, USA, 6–9 July 2009. - : IEEE conference proceedings. - 9780982443804 ; , s. 694-701
  • Konferensbidrag (refereegranskat)abstract
    • The increased societal need for surveillance and the decrease in cost of sensors have led to a number of new challenges. The problem is not to collect data but to use it effectively for decision support. Manual interpretation of huge amounts of data in real-time is not feasible; the operator of a surveillance system needs support to analyze and understand all incoming data. In this paper an approach to intelligent video surveillance is presented, with emphasis on finding behavioural anomalies. Two different anomaly detection methods are compared and combined. The results show that it is possible to best increase the total detection performance by combining two different anomaly detectors rather than employing them independently. 
  •  
7.
  • Brax, Christoffer (författare)
  • Anomaly detection in the surveillance domain
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • In the post September 11 era, the demand for security has increased in virtually all parts of the society. The need for increased security originates from the emergence of new threats which differ from the traditional ones in such a way that they cannot be easily defined and are sometimes unknown or hidden in the “noise” of daily life.When the threats are known and definable, methods based on situation recognition can be used find them. However, when the threats are hard or impossible to define, other approaches must be used. One such approach is data-driven anomaly detection, where a model of normalcy is built and used to find anomalies, that is, things that do not fit the normal model. Anomaly detection has been identified as one of many enabling technologies for increasing security in the society.In this thesis, the problem of how to detect anomalies in the surveillance domain is studied. This is done by a characterisation of the surveillance domain and a literature review that identifies a number of weaknesses in previous anomaly detection methods used in the surveillance domain. Examples of identified weaknesses include: the handling of contextual information, the inclusion of expert knowledge and the handling of joint attributes. Based on the findings from this study, a new anomaly detection method is proposed. The proposed method is evaluated with respect to detection performance and computational cost on a number datasets, recorded from real-world sensors, in different application areas of the surveillance domain. Additionally, the method is also compared to two other commonly used anomaly detection methods. Finally, the method is evaluated on a dataset with anomalies developed together with maritime subject matter experts. The conclusion of the thesis is that the proposed method has a number of strengths compared to previous methods and is suitable foruse in operative maritime command and control systems.
  •  
8.
  •  
9.
  • Brax, Christoffer, et al. (författare)
  • Enhanced situational Awareness in the Maritime Domain : An Agent-based Approach for Situation Management
  • 2009
  • Ingår i: Intelligent Sensing, Situation Management, Impact Assessment, and Cyber-Sensing. - : SPIE Press. - 9780819476180 ; , s. Aticle ID 735203-
  • Konferensbidrag (refereegranskat)abstract
    • Maritime Domain Awareness is important for both civilian and military applications. An important part of MDA is detection of unusual vessel activities such as piracy, smuggling, poaching, collisions, etc. Today's interconnected sensorsystems provide us with huge amounts of information over large geographical areas which can make the operators reach their cognitive capacity and start to miss important events. We propose and agent-based situation management system that automatically analyse sensor information to detect unusual activity and anomalies. The system combines knowledge-based detection with data-driven anomaly detection. The system is evaluated using information from both radar and AIS sensors.
  •  
10.
  • Brax, Christoffer, et al. (författare)
  • Evaluating Precise and Imprecise State-Based Anomaly Detectors for Maritime Surveillance
  • 2010
  • Ingår i: Proceedings of the 13th International Conference on Information Fusion. - : IEEE. - 9780982443811 ; , s. Article number 5711997-
  • Konferensbidrag (refereegranskat)abstract
    • We extend the State-Based Anomaly Detection approach by introducing precise and imprecise anomaly detectors using the Bayesian and credal combination operators, where evidences over time are combined into a joint evidence. We use imprecision in order to represent the sensitivity of the classification regarding an object being  normal or anomalous. We evaluate the detectors on a real-world maritime dataset containing recorded AIS data and show that the anomaly detectors outperform   previously proposed detectors based on Gaussian mixture models and kernel density estimators. We also show that our introduced anomaly detectors perform slightly better than the State-Based Anomaly Detection approach with a sliding window.
  •  
11.
  • Brax, Christoffer, et al. (författare)
  • Finding behavioural anomalies in public areas using video surveillance data
  • 2008
  • Ingår i: Proceedings of the 11th International Conference on Information Fusion. - : IEEE. - 9783000248832 - 9783800730926 ; , s. 1655-1662
  • Konferensbidrag (refereegranskat)abstract
    •  In this paper we propose an approach forvdetecting anomalies in data from visual surveillancevsensors. The approach includes creating a structure for representing data, building “normal models” by filling the structure with data for the situation at hand, and finally detecting deviations in the data. The approach allows detections based on the incorporation of a priori knowledge about the situation and on data-driven analysis. The main advantages with the approach compared to earlier work is the low computational requirements, iterative update of normal models and a high explainability of found anomalies. The proposed approach is evaluated off-line using real-world data and the results support that the approach could be used to detect anomalies in real-time applications. 
  •  
12.
  • Butler, Simon, et al. (författare)
  • An Exploration of Openness in Hardware and Software Through Implementation of a RISC-V Based Desktop Computer
  • 2022
  • Ingår i: OpenSym '22. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450398459 - 9781450398466
  • Konferensbidrag (refereegranskat)abstract
    • Open hardware and open source software platforms bring benefits to both implementers and users in the form of system adaptability and maintainability, and through the avoidance of lock-in, for example. Development of the \riscv\ Instruction Set Architecture and processors during the last ten years has made the implementation of a desktop computer using open hardware, including open processors, and open source software an approaching possibility. We use the SiFive Unmatched development board and Ubuntu Linux, and the recorded experiences of system builders using the Unmatched board to explore the extent to which it is possible to create an open desktop computer. The work identifies current limitations to implementing an open computer system, which lie mainly at the interface between the operating system and hardware components. Potential solutions to the challenges uncovered are proposed, including greater consideration of openness during the early stages of product design. A further contribution is made by an account of the synergies arising from open collaboration in a private-collective innovation process.
  •  
13.
  • Butler, Simon, et al. (författare)
  • Considerations and challenges for the adoption of open source components in software-intensive businesses
  • 2022
  • Ingår i: Journal of Systems and Software. - : Elsevier. - 0164-1212 .- 1873-1228. ; 186
  • Tidskriftsartikel (refereegranskat)abstract
    • Component-Based Software Development is a conventional way of working for software-intensive businesses and OpenSource Software (OSS) components are frequently considered by businesses for adoption and inclusion in softwareproducts. Previous research has found a variety of practices used to support the adoption of OSS components, in-cluding formally specified processes and less formal, developer-led approaches, and that the practices used continue todevelop. Evolutionary pressures identified include the proliferation of available OSS components and increases in thepace of software development as businesses move towards continuous integration and delivery. We investigate workpractices used in six software-intensive businesses in the primary and secondary software sectors to understand currentapproaches to OSS component adoption and the challenges businesses face establishing effective work practices to eval-uate OSS components. We find businesses have established processes for evaluating OSS components and communitiesthat support more complex and nuanced considerations of the cost and risks of component adoption alongside matterssuch as licence compliance and functional requirements. We also found that the increasing pace and volume of softwaredevelopment within some businesses provides pressure to continue to evolve software evaluation processes.
  •  
14.
  • Butler, Simon, et al. (författare)
  • Maintaining interoperability in open source software : A case study of the Apache PDFBox project
  • 2020
  • Ingår i: Journal of Systems and Software. - : Elsevier. - 0164-1212 .- 1873-1228. ; 159
  • Tidskriftsartikel (refereegranskat)abstract
    • Software interoperability is commonly achieved through the implementation of standards for communication protocols or data representation formats. Standards documents are often complex, difficult to interpret, and may contain errors and inconsistencies, which can lead to differing interpretations and implementations that inhibit interoperability. Through a case study of two years of activity in the Apache PDFBox project we examine day-to-day decisions made concerning implementation of the PDF specifications and standards in a community open source software (OSS) project. Thematic analysis is used to identify semantic themes describing the context of observed decisions concerning interoperability. Fundamental decision types are identified including emulation of the behaviour of dominant implementations and the extent to which to implement the PDF standards. Many factors influencing the decisions are related to the sustainability of the project itself, while other influences result from decisions made by external actors, including the developers of dependencies of PDFBox. This article contributes a fine grained perspective of decision-making about software interoperability by contributors to a community OSS project. The study identifies how decisions made support the continuing technical relevance of the software, and factors that motivate and constrain project activity. 
  •  
15.
  • Butler, Simon, et al. (författare)
  • On business adoption and use of reproducible builds for open and closed source software
  • 2023
  • Ingår i: Software quality journal. - : Springer Nature Switzerland AG. - 0963-9314 .- 1573-1367. ; 31:3, s. 687-719
  • Tidskriftsartikel (refereegranskat)abstract
    • Reproducible builds (R-Bs) are software engineering practices that reliably create bit-for-bit identical binary executable files from specified source code. R-Bs are applied in someopen source software (OSS) projects and distributions to allow verification that the distrib-uted binary has been built from the released source code. The use of R-Bs has been advo-cated in software maintenance and R-Bs are applied in the development of some OSS secu-rity applications. Nonetheless, industry application of R-Bs appears limited, and we seekto understand whether awareness is low or if significant technical and business reasonsprevent wider adoption. Through interviews with software practitioners and business man-agers, this study explores the utility of applying R-Bs in businesses in the primary and sec-ondary software sectors and the business and technical reasons supporting their adoption.We find businesses use R-Bs in the safety-critical and security domains, and R-Bs are valu-able for traceability and support collaborative software development. We also found thatR-Bs are valued as engineering processes and are seen as a badge of software quality, butwithout a tangible value proposition. There are good engineering reasons to use R-Bs inindustrial software development, and the principle of establishing correspondence betweensource code and binary offers opportunities for the development of further applications.
  •  
16.
  • Butler, Simon, et al. (författare)
  • On Company Contributions to Community Open Source Software Projects
  • 2021
  • Ingår i: IEEE Transactions on Software Engineering. - : Institute of Electrical and Electronics Engineers (IEEE). - 0098-5589 .- 1939-3520. ; 47:7, s. 1381-1401
  • Tidskriftsartikel (refereegranskat)abstract
    • The majority of contributions to community open source software (OSS) projects are made by practitioners acting on behalf of companies and other organisations. Previous research has addressed the motivations of both individuals and companies to engage with OSS projects. However, limited research has been undertaken that examines and explains the practical mechanisms or work practices used by companies and their developers to pursue their commercial and technical objectives when engaging with OSS projects. This research investigates the variety of work practices used in public communication channels by company contributors to engage with and contribute to eight community OSS projects. Through interviews with contributors to the eight projects we draw on their experiences and insights to explore the motivations to use particular methods of contribution. We find that companies utilise work practices for contributing to community projects which are congruent with the circumstances and their capabilities that support their short- and long-term needs. We also find that companies contribute to community OSS projects in ways that may not always be apparent from public sources, such as employing core project developers, making donations, and joining project steering committees in order to advance strategic interests. The factors influencing contributor work practices can be complex and are often dynamic arising from considerations such as company and project structure, as well as technical concerns and commercial strategies. The business context in which software created by the OSS project is deployed is also found to influence contributor work practices.
  •  
17.
  • Fooladvandi, Farzad, et al. (författare)
  • Signature-based activity detection based on Bayesian networks acquired from expert knowledge
  • 2009
  • Ingår i: Proceedings of the 12<sup>th</sup> International Conference on Information Fusion (FUSION 2009). - : ISIF. - 9780982443804 ; , s. 436-443
  • Konferensbidrag (refereegranskat)abstract
    •  The maritime industry is experiencing one of its longest and fastest periods of growth. Hence, the global maritime surveillance capacity is in a great need of growth as well. The detection of vessel activity is an important objective of the civil security domain. Detecting vessel activity may become problematic if audit data is uncertain. This paper aims to investigate if Bayesian networks acquired from expert knowledge can detect activities with a signature-based detection approach. For this, a maritime pilot-boat scenario has been identified with a domain expert. Each of the scenario’s activities has been divided up into signatures where each signature relates to a specific Bayesian network information node. The signatures were implemented to find evidences for the Bayesian network information nodes. AIS-data with real world observations have been used for testing, which have shown that it is possible to detect the maritime pilot-boat scenario based on the taken approach. 
  •  
18.
  • Gamalielsson, Jonas, et al. (författare)
  • On availability of Open Source Software reference implementations for standards issued by different standards setting organisations
  • 2023
  • Ingår i: Joint Proceedings EURAS &amp; SIIT 2023. - Aachen : Verlag Mainz. - 9783958864917 - 3958864910 ; , s. 97-116
  • Konferensbidrag (refereegranskat)abstract
    • Software reference implementations of ICT standards have an important role for verifying that a standard is implementable, supporting interoperability testing among other implementations, and providing feedback to the standard development process. Providing reference implementations and widely used implementations of a standard as Open Source Software also promotes wide deployment in software systems, avoidance of different lock-in effects, interoperability, and longevity of systems and associated digital assets. In this paper results are reported on the availability of reference implementations and widely deployed implementations provided as Open Source Software for standards issued by different standards setting organisations. Specifically, findings draw from observations and analyses related to software implementations for identified standards issued by ETSI, IEC, IEEE, IETF, ISO, ITU-T, OASIS, and W3C.
  •  
19.
  • Gamalielsson, Jonas, et al. (författare)
  • On engagement with ICT standards and their implementations in open source software projects : the case of WebRTC
  • 2022
  • Ingår i: Proceedings 26th EURAS Annual Standardisation Conference. - Aachen : Verlag Mainz. - 9783958864467 ; , s. 143-162
  • Konferensbidrag (refereegranskat)abstract
    • Real-time communication (RTC) technologies for the web provide opportunities for individuals and organisations to work and collaborate remotely, and the need for such technologies has recently increased. Use of RTC technologies and tools for the web involves a number of challenges concerning data privacy and lock-in effects, such as dependency to specific suppliers and proprietary technologies. Use of open standards for RTC and open source software (OSS) implementing such standards can create conditions for avoiding issues related to data privacy and lock-in, and thereby provides opportunities for long-term sustainable solutions. The paper characterises how engagement with standardisation of WebRTC in the context of IETF and W3C is related to engagement with the WebRTC OSS project.
  •  
20.
  •  
21.
  • Gamalielsson, Jonas, et al. (författare)
  • Open Source Software reference implementations for standards issued by different standards setting organisations : availability, perceptions and practices
  • 2024
  • Ingår i: Journal of Standardisation. - : TU Delft Open. - 2772-9249. ; 3:2
  • Tidskriftsartikel (refereegranskat)abstract
    • Software reference implementations of ICT standards have an important role for verifying that a standard is implementable, supporting interoperability testing among other implementations, and providing feedback to the standard development process. Providing reference implementations and widely used implementations of a standard as Open Source Software promotes wide deployment in software systems, interoperability, longevity of systems and associated digital assets, and avoidance of different lock-in effects. In this paper results are reported on the availability of, and perceptions and practices concerning, reference implementations and widely deployed implementations provided as Open Source Software for standards issued by different standards setting organisations. Specifically, findings draw from observations and analyses related to software implementations for identified standards and policy statements, issued by ETSI, IEC, IEEE, IETF, ISO, ITU-T, OASIS, and W3C.
  •  
22.
  • Gamalielsson, Jonas, et al. (författare)
  • Towards open government through open source software for web analytics : The case of Matomo
  • 2021
  • Ingår i: eJournal of eDemocracy & Open Government. - Krems : Department for E-Governance and Administration, Danube University Krems. - 2075-9517. ; 13:2, s. 133-153
  • Tidskriftsartikel (refereegranskat)abstract
    • Web analytics technologies provide opportunities for organisations to obtain information about users visiting their websites in order to understand and optimise web usage. Use of such technologies often leads to issues related to data privacy and potential lock-in to specific suppliers and proprietary technologies. Use of open source software (OSS) for web analytics can create conditions for avoiding issues related to data privacy and lock-in, and thereby provides opportunities for a long-term sustainable solution for organisations both in the public and private sectors. This paper characterises use of and engagement with OSS projects for web analytics. Specifically, we contribute a characterisation of use of OSS licensed web analytics technologies in Swedish government authorities, and a characterisation of organisational engagement with the Matomo OSS project for web analytics.
  •  
23.
  •  
24.
  • Gustavsson, Per M., et al. (författare)
  • Service Oriented Simulations Concept
  • 2005
  • Ingår i: Proceedings of the 10th Simulation conference and exhibition. ; , s. 533-538
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • In the effort to provide simulation support to the future Network Based Defence (NBD) that are currently being applied by the Swedish Armed Forces (SwAF), and the similair work within US and NATO, the authors opinion is that simulation should be treated as any other services, existing in the operational systems. Meaning that architecture should be conformant between the operational and simulated systems, for a start use the same infrastructure. The choice so far for simulation is the High Level Architecture (HLA). During the author’s participation in ongoing work supporting NBD, questions have gradually been raised if HLA is the simulation path to walk. In the Core Enterprise Services (CES) and Swedish Armed Force Enterprise Architecture (FMA) Services IT-Kernel, core services are specified and HLA do address a lot of non-simulation specific services giving unwanted redundancy. However, the services already defined may with some enhancements deliver the same services addressed within FMA Services ITKernel. The Next Generation HLA could be more than just a simulation standard if it utilizes the FMA ideas. In this paper the authors present the ongoing work, as it stands today, with Service Oriented Simulations, that is an outlook for simulation using the architectural structuring, services, components and infrastructures concepts evolving in FMA and Global Information Grid (GIG). The focus of the work is to enable interoperable simulation support for the whole system lifecycle – Acquisition, Development, Training, Planning, In-the-Field decision support, System removal – within NBD, entailing that the architecture for simulation is uniform regardless of its application and giving end-users the capability to focus on what to simulate instead of how to simulate.
  •  
25.
  • Gustavsson, Per M., 1965-, et al. (författare)
  • Towards Service Oriented Simulations
  • 2004
  • Ingår i: Fall Simulation Interoperability Workshop 2004. ; , s. 219-229
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • In the effort to provide simulation support to the future Network Based Defence (NBD)1 that are currently being applied by the Swedish Armed Forces (SwAF), the authors opinion is that simulation should be treated as any other services and use the same architectural requirements addressed in the SwAF Enterprise Architecture (FMA)2 and in subsidiary documents.The choice so far for simulation is the High Level Architecture (HLA). During the author’s participation in ongoing work supporting NBD, questions have gradually been raised if HLA is the simulation path to walk. In the Core Enterprise Services (CES) and FMA Services IT-Kernel, core services are specified and HLA do address a lot of non-simulation specific services giving unwanted redundancy. However, the services already defined may with some enhancements deliver the same services addressed within CES and FMA Services IT-Kernel. Furthermore, HLA also comes with the Federation Development and Execution Process (FEDEP) that introduce process methodology to build HLA federations. Basically FEDEP is a software development process for distributed systems. The Next Generation HLA could be more than just a simulation standard if it utilizes the FMA ideas and avoids the green HLA elephant3.In this paper the authors present the ongoing work, as it stands today, with Service Oriented Simulations, that is an outlook for simulation using the architectural structuring, services, components and infrastructures concepts evolving in FMA and with the Global Information Grid (GIG) Enterprise Services (GES) in mind. The focus is to identify simulation services that encapsulate the core features of simulation. Thereby reducing redundancy in methodology and service as well as enabling interoperable simulation support for the whole system lifecycle – Acquisition, Development, Training, Planning, In-the-Field decision support, System removal – within NBD, entailing that the architecture for simulation is uniform regardless of its application and giving end-users the capability to focus on what to simulate instead of how to simulate.
  •  
26.
  • Jeusfeld, Manfred A., et al. (författare)
  • Taxonomy of Events and Components in the Power Grid : Technical description for work packages 3.1 and 3.2 of the ELVIRA Project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work-package 3.1&3.2 entitled “Taxonomy of Critical Infrastructure (Taxonomy of events + Taxonomy of CI component and relationship)”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity.
  •  
27.
  • Jiang, Yuning, 1993-, et al. (författare)
  • A Language and Repository for Cyber Security of Smart Grids
  • 2018
  • Ingår i: 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018). - Los Alamitos, CA : IEEE. - 9781538641392 ; , s. 164-170
  • Konferensbidrag (refereegranskat)abstract
    • Power grids form the central critical infrastructure in all developed economies. Disruptions of power supply can cause major effects on the economy and the livelihood of citizens. At the same time, power grids are being targeted by sophisticated cyber attacks. To counter these threats, we propose a domain-specific language and a repository to represent power grids and related IT components that control the power grid. We apply our tool to a standard example used in the literature to assess its expressiveness.
  •  
28.
  • Jiang, Yuning, 1993-, et al. (författare)
  • Complex Dependencies Analysis : Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
  • 2018
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.
  •  
29.
  • Jiang, Yuning, 1993- (författare)
  • Vulnerability Analysis for Critical Infrastructures
  • 2022
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. Therefore, the need to improve cybersecurity expectations of CIs through vulnerability assessments cannot be overstated. Yet, CI cybersecurity has intrinsic challenges due to the convergence of information technology (IT) and operational technology (OT) as well as the crosslayer dependencies that are inherent to CPS based CIs. Different IT and OT security terminologies also lead to ambiguities induced by knowledge gaps in CI cybersecurity. Moreover, current vulnerability-assessment processes in CIs are mostly subjective and human-centered. The imprecise nature of manual vulnerability assessment operations and the massive volume of data cause an unbearable burden for security analysts. Latest advances in machine-learning (ML) based cybersecurity solutions promise to shift such burden onto digital alternatives. Nevertheless, the heterogeneity, diversity and information gaps in existing vulnerability data repositories hamper accurate assessments anticipated by these ML-based approaches. Therefore, a comprehensive approach is envisioned in this thesis to unleash the power of ML advances while still involving human operators in assessing cybersecurity vulnerabilities within deployed CI networks.Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level of automation in vulnerability analysis. The proposed methodology follows design science research principles to support the development and validation of scientifically-sound artifacts. More specifically, the proposed data-driven cybersecurity architecture orchestrates a range of modules that include: (i) a vulnerability data model that captures a variety of publicly accessible cybersecurity-related data sources; (ii) an ensemble-based ML pipeline method that self-adjusts to the best learning models for given cybersecurity tasks; and (iii) a knowledge taxonomy and its instantiated power grid and manufacturing models that capture CI common semantics of cyberphysical functional dependencies across CI networks in critical societal domains. This research contributes data-driven vulnerability analysis approaches that bridge the knowledge gaps among different security functions, such as vulnerability management through related reports analysis. This thesis also correlates vulnerability analysis findings to coordinate mitigation responses in complex CIs. More specifically, the vulnerability data model expands the vulnerability knowledge scope and curates meaningful contexts for vulnerability analysis processes. The proposed ML methods fill information gaps in vulnerability repositories using curated data while further streamlining vulnerability assessment processes. Moreover, the CI security taxonomy provides disciplined and coherent support to specify and group semanticallyrelated components and coordination mechanisms in order to harness the notorious complexity of CI networks such as those prevalent in power grids and manufacturing infrastructures. These approaches learn through interactive processes to proactively detect and analyze vulnerabilities while facilitating actionable insights for security actors to make informed decisions.
  •  
30.
  • Lidberg, William, et al. (författare)
  • Detection of hunting pits using airborne laser scanning and deep learning
  • 2024
  • Ingår i: Journal of field archaeology. - : Routledge. - 0093-4690 .- 2042-4582.
  • Tidskriftsartikel (refereegranskat)abstract
    • Forests worldwide contain unique cultural traces of past human land use. Increased pressure on forest ecosystems and intensive modern forest management methods threaten these ancient monuments and cultural remains. In northern Europe, older forests often contain very old traces, such as millennia-old hunting pits and indigenous Sami hearths. Investigations have repeatedly found that forest owners often fail to protect these cultural remains and that many are damaged by forestry operations. Current maps of hunting pits are incomplete, and the locations of known pits have poor spatial accuracy. This study investigated whether hunting pits can be automatically mapped using national airborne laser data and deep learning. The best model correctly mapped 70% of all the hunting pits in the test data with an F1 score of 0.76. This model can be implemented across northern Scandinavia and could have an immediate effect on the protection of cultural remains.
  •  
31.
  • Lundell, Björn, et al. (författare)
  • Effective Strategies for Using Open Source Software and Open Standards in Organizational Contexts : Experiences From the Primary and Secondary Software Sectors
  • 2022
  • Ingår i: IEEE Software. - : IEEE. - 0740-7459 .- 1937-4194. ; 39:1, s. 84-92
  • Tidskriftsartikel (refereegranskat)abstract
    • Open source software (OSS) and open standards have become increasingly important for addressing challenges related to lock-in, interoperability and long-term maintenance of systems and associated digital assets. OSS projects operate under different conditions and many projects and organisations consider successful governance and strategic involvement with projects to constitute major challenges. Today, many companies seek to establish work practices which facilitate strategic engagement with OSS projects. Based on findings from collaborative research which draws from rich insights and extensive experiences from practice, the paper presents seven actionable strategies for organisations that seek to leverage long-term involvement with OSS projects. 
  •  
32.
  • Lundell, Björn, et al. (författare)
  • Enabling OSS usage through procurement projects : How can lock-in effects be avoided?
  • 2021
  • Ingår i: Open Source Systems. - Cham : Springer. - 9783030752507 - 9783030752538 - 9783030752514 ; , s. 16-27
  • Konferensbidrag (refereegranskat)abstract
    • Formulation of mandatory requirements in procurement projects has significant influence on opportunities for development and deployment of Open Source Software (OSS). The paper contributes insights on a widespread practice amongst public procurement projects which causes problematic lock-in effects and thereby inhibits opportunities for use of OSS solutions. Through a systematic investigation of 30 randomly selected procurement projects in the software domain the paper highlights illustrative examples of mandatory requirements which cause lock-in and presents five recommendations for how requirements instead should be formulated in order to avoid causing lock-in. Findings show significant lock-in caused by current procurement practices with a stark preference for proprietary software and SaaS solutions amongst procuring organisations.
  •  
33.
  • Lundell, Björn, et al. (författare)
  • Half a step behind – bulk disclosure of confidential data in third-party GenAI solutions under the Swedish Public Access to Information and Secrecy Act
  • 2024
  • Ingår i: Digital Government: Research and Practice. - : ACM Digital Library. - 2691-199X .- 2639-0175.
  • Tidskriftsartikel (refereegranskat)abstract
    • Technological progress poses unique challenges for the public sector. New technology should be adopted, but it must always be done within the framework of good administration. It follows laws governing public administration must be continuously adapted. Sweden recently amended its secrecy legislation to facilitate the use of third-party cloud solutions by public authorities. When the amendment was enacted, most public sector organisations had already been using external cloud solutions for a long time. Today, there is as much pressure on authorities to implement AI technology as there ever was to move administration into the cloud. This paper uses traditional legal methodology to investigate if the Swedish secrecy legislation adequately enables the use of cloud-based GenAI solutions. Findings indicate that the recent amendment is likely insufficient and that there are significant practical hurdles for the application of the law, particularly with services from global cloud providers. The paper contributes to the understanding of Swedish law, and of the difficulties that can occur anywhere when policy makers and legislators do not move in tandem.
  •  
34.
  •  
35.
  • Niklasson, Lars, et al. (författare)
  • Extending the scope of Situation Analysis
  • 2008
  • Ingår i: Proceedings of the 11th International Conference on Information Fusion (FUSION 2008)<em></em>, Cologne, Germany, June 30–July 3, 2008. - : IEEE Press. - 9783000248832 ; , s. 454-461
  • Konferensbidrag (refereegranskat)abstract
    • The use of technology to assist human decision making has been around for quite some time now. In the literature, models of both technological and human aspects of this support can be identified. However, we argue that there is a need for a unified model which synthesizes and extends existing models. In this paper, we give two perspectives on situation analysis: a technological perspective and a human perspective. These two perspectives are merged into a unified situation analysis model for semi-automatic, automatic and manual decision support (SAM)2. The unified model can be applied to decision support systems with any degree of automation. Moreover, an extension of the proposed model is developed which can be used for discussing important concepts such as common operational picture and common situation awareness.
  •  
36.
  • Robles, Gregorio, et al. (författare)
  • On the Industrial Leadership and Involvement in the LwM2M IoT Ecosystem
  • 2024
  • Ingår i: Proceedings 2024 ACM/IEEE 6th International Workshop on Software Engineering Research &amp; Practices for the Internet of Things SERP4IoT 2024. - : Association for Computing Machinery (ACM). - 9798400705786 ; , s. 44-51
  • Konferensbidrag (refereegranskat)abstract
    • The importance of standards, and especially ICT standards, in the IoT domain is widely recognised. Implementations of standard specifications provided as Open Source Software (OSS) promote interoperability and longevity of systems and create conditions for avoiding lock-in, and industrial involvement is important since it can affect community dynamics and will to contribute. The overarching goal of this study is to characterize the industrial leadership and involvement in the LwM2M (Lightweight machine to machine) ecosystem. Specifically, the main focus of the study is on involvement with OSS projects implementing LwM2M elements by individuals who cooperate in projects that implement or use the LwM2M standard in their projects. This can be done by analyzing the commits to the git repository, the bugs issued and commented in the bug-tracking system and the pull requests performed in the project. Techniques will be applied to merge authors using different identities (i.e., different e-mail addresses). By means of identifying the affiliation of those individuals we plan to analyze the involvement of companies in those projects, and thus how they are present in an IoT standard, in this case LwM2M.
  •  
37.
  • Tiberg, Jesper, et al. (författare)
  • Towards Hypothesis Evaluation in Command and Control Systems
  • 2006
  • Ingår i: Proceedings of SAIS 2006. - Umeå : Swedish Artificial Intelligence Society - SAIS. ; , s. 97-102
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • This work focus on situation prediction in data fusion systems. A hypothesis evaluation algorithm based on artificial neural networks is introduced. It is evaluated and compared to an algorithm based on Bayesian networks which is commonly used. It is also compared to a simple "dummy" algorithm. For the tests, a computer based model of the environment, including protected objects and enemy objects, is implemented. The model handles the navigation of the enemy objects and situational data is extracted from the environment and provided for the hypothesis evaluation algorithms. It was the belief of the author that ANNs would be suitable for hypothesis evaluation if a suitable data representation of the environment were used. The representation requirements include pre processing of the situational data to eliminate the need for variable input size to the algorithm. This because ANNs poorly handles this; the whole network have to be retrained each time the amount of input data changes. The results show that ANNs performed best of the three and hence seems to be suitable for hypothesis evaluation.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-37 av 37
Typ av publikation
konferensbidrag (22)
tidskriftsartikel (9)
rapport (4)
doktorsavhandling (2)
Typ av innehåll
refereegranskat (27)
övrigt vetenskapligt/konstnärligt (10)
Författare/redaktör
Brax, Christoffer (36)
Gamalielsson, Jonas (14)
Lundell, Björn (14)
Mattsson, Anders (14)
Feist, Jonas (14)
Gustavsson, Tomas (13)
visa fler...
Butler, Simon (10)
Persson, Tomas (9)
Niklasson, Lars (8)
Atif, Yacine, 1967- (6)
Ding, Jianguo (6)
Öberg, Jonas (6)
Lönroth, Erik (6)
Jiang, Yuning, 1993- (5)
Gustavsson, Per M., ... (4)
Lindström, Birgitta (4)
Haglund, Daniel (4)
Jeusfeld, Manfred A. (3)
Gustavsson, Per M. (3)
Andler, Sten F. (3)
Dahlbom, Anders (3)
Jeusfeld, Manfred (3)
Smedberg, Martin (3)
Kvarnström, Bengt (3)
Johansson, Fredrik (2)
Ziemke, Tom (2)
Falkman, Göran, 1968 (2)
Planstedt, Tomas (2)
Andler, Sten (2)
Nero, Eva (2)
Laxhammar, Rikard (2)
Riveiro, Maria (2)
Warston, Håkan (2)
Lindström, Björn (1)
Sandström, Camilla, ... (1)
Gustavsson, Thomas (1)
Fredin, Mikael (1)
Karlsson, Alexander (1)
Yuning, Jiang (1)
Karlsson, Gunnar (1)
Östlund, Lars (1)
Lidberg, William (1)
Gustavsson, Per, 196 ... (1)
Johansson, Ronnie (1)
Niklasson, Lars, Pro ... (1)
Falkman, Göran, Asso ... (1)
Driankov, Dimiter, P ... (1)
Johnson, Henric, Dr (1)
Sjöberg, Johan (1)
Fischer, Thomas, Dr. ... (1)
visa färre...
Lärosäte
Högskolan i Skövde (36)
Blekinge Tekniska Högskola (6)
Jönköping University (3)
Umeå universitet (1)
Örebro universitet (1)
Språk
Engelska (37)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (33)
Teknik (5)
Samhällsvetenskap (5)
Lantbruksvetenskap (1)
Humaniora (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy