The table below lists the papers that were published by the SEGRID project partners
Partner | Title | Title of magazine/conference |
---|---|---|
FFCUL | Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining | Special issue of IEEE Transactions on Reliability |
FFCUL | Fault-Tolerant Precision Time Protocol for Smart Grids | INFOFORUM |
ENCS | Klaus Kursawe and Christiane Peters: Structural Weaknesses in the Open Smart Grid Protocol. | The proceedings of the Tenth International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-28, 2015. IEEE Computer Society 2015. |
FFCUL | Securing Passive Replication Through Verification | SRDS 2015 |
KTH | Working time between vulnerability disclosures: A measure of software product vulnerability | Computers & Security |
KTH | A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources | International Workshop on Methodical Development of Modeling Tools (ModTools15) |
FFCUL | Towards Secure and Dependable Authentication and Authorization Infrastructures | 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC) |
FFCUL | SITAN: Services for Ad Hoc Networks with Unknown Participants | The 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014) |
SICS | Simulative evaluation of security attacks in networked critical infrastructures | 2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2015) |
FFCUL | Equipping WAP with WEAPONS to Detect Vulnerabilities, | IEEE Conference on Dependable Systems and Networks |
FFCUL | JITeR: Just-in-time application-layer routing | Computer networks |
FFCUL | SieveQ: A Layered BFT Protection System for Critical Services, | IEEE Transactions on Dependable and Secure Computing |
FFCUL | Photons with Electrons to Reduce the Energy Footprint of IPTV Networks, | IFIP Networking 2016 |
FFCUL | Hacking the DBMS to Prevent Injection Attacks | ACM Conference on Data and Applications Security and Privacy |
ABB, TNO | Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids | CPSR-SG2016 workshop, to appear in IEEE proceedings |
ABB | A Framework for MAC Layer Wireless Intrusion Detection & Response for Smart Grid Applications | Accepted in the 14th IEEE International Conference on Industrial Informatics (INDIN), Poitiers, France, July 2016 |
SICS | GREP: a Group REkeying Protocol Based on Member Join History” | Proceedings of the twenty-first IEEE Symposium on Computers and Communications (ISCC 2016), 2016 |
SICS | Robust and scalable DTLS Session establishment | ERCIM News, number 106, July 2016, special theme: Cyber security |
SICS | Performance and Security Evaluation of SDN Networks in OMNeT++/INET | OMNeT++ Community Summit 2016 |
KTH | Automatic Probabilistic Enterprise IT ArchitectureModeling: a Dynamic Bayesian Networks Approach | 20th IEEE International Enterprise Distributed Object Computing Conference Workshops, 2016. |
KTH | pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approa | Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), IEEE, Salzburg, Austria, 2016 |
KTH | Analyzing Attack Resilience of an Advanced Meter Infrastructure Reference Model, in Proceedings of the 2016 | Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) 2016). |
TNO | SEGRID introductory article | The European CIIP Newsletter (ECN) |
ABB, EDP, TNO | An Enhanced Risk Assessment Methodology for Smart Grid | IEEE Computer, special issue on Risk assessment, Volume 50, issue 4, page 62 – 71 |
TNO | ‘Smart grids: And the bad news is?’ | In the international journal of critical infrastructure protection 18 (2017) 34–36 |
TNO | SEGRID introduction | European eneegy innovation magazine issue of summer 2017 |
KTH | In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis | proc. of the 9th International Workshop on Vocabularies, Ontologies and Rules for the Enterprise, co-located with the 21st IEEE International EDOC Conference, 2017. |
KTH | A Study on Software Vulnerabilities and Weaknesses of Embedded Systems in Power Grids | Proc. of the 2nd Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), 2017 |
KTH | Analyzing the Effectiveness of Attack Countermeasures in a SCADA System, | Proc. of the 2nd Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), 2017 |
TNO | Privacy Friendly Aggregation of Smart Meter Readings Even When Meters Crash | Proc. of the 2nd Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), 2017 |
RISE SICS | On Improving Resistance to Denial of Service and Key Provisioning Scalability of the DTLS Handshake | International Journal of Information Security, Springer, vol. 16, issue 2, 2017 |
FCiencias.ID | Secure Network Monitoring Using Programmable Data Planes | Proceedings of the Third International Workshop on Security in NFV-SDN (SN), Berlin, Germany, November 2017 |
FCiencias.ID | Resolução de Dependências Circulares em Inclusão de Código em Análise Estática de Código | INFORUM – Simpósio de Informática (INFORUM), Aveiro, Portugal, October 2017 |
FCiencias.ID | Demonstrating a Tool for Injection Attack Prevention in MySQL | Proceedings of the International Conference on Dependable Systems and Networks (DSN), Denver, USA, June 2017 |
FCiencias.ID | DEKANT: A Static Analysis Tool that Learns to Detect Web Application Vulnerabilities | Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), Saarbrücken, Germany, July 2016 |