his.sePublikasjoner
Endre søk
Link to record
Permanent link

Direct link
BETA
Publikasjoner (10 av 38) Visa alla publikasjoner
Atif, Y., Al-Falahi, K., Wangchuk, T. & Lindström, B. (2019). A fuzzy logic approach to influence maximization in social networks. Journal of Ambient Intelligence and Humanized Computing
Åpne denne publikasjonen i ny fane eller vindu >>A fuzzy logic approach to influence maximization in social networks
2019 (engelsk)Inngår i: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145Artikkel i tidsskrift (Fagfellevurdert) Epub ahead of print
Abstract [en]

Within a community, social relationships are paramount to profile individuals’ conduct. For instance, an individual within a social network might be compelled to embrace a behaviour that his/her companion has recently adopted. Such social attitude is labelled social influence, which assesses the extent by which an individual’s social neighbourhood adopt that individual’s behaviour. We suggest an original approach to influence maximization using a fuzzy-logic based model, which combines influence-weights associated with historical logs of the social network users, and their favourable location in the network. Our approach uses a two-phases process to maximise influence diffusion. First, we harness the complexity of the problem by partitioning the network into significantly-enriched community-structures, which we then use as modules to locate the most influential nodes across the entire network. These key users are determined relatively to a fuzzy-logic based technique that identifies the most influential users, out of which the seed-set candidates to diffuse a behaviour or an innovation are extracted following the allocated budget for the influence campaign. This way to deal with influence propagation in social networks, is different from previous models, which do not compare structural and behavioural attributes among members of the network. The performance results show the validity of the proposed partitioning-approach of a social network into communities, and its contribution to “activate” a higher number of nodes overall. Our experimental study involves both empirical and real contemporary social-networks, whereby a smaller seed set of key users, is shown to scale influence to the high-end compared to some renowned techniques, which employ a larger seed set of key users and yet they influence less nodes in the social network.

sted, utgiver, år, opplag, sider
Springer, 2019
Emneord
Social networks, Community detection, Influence propagation, Fuzzy logic
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS)
Identifikatorer
urn:nbn:se:his:diva-16779 (URN)10.1007/s12652-019-01286-2 (DOI)2-s2.0-85064252809 (Scopus ID)
Tilgjengelig fra: 2019-04-15 Laget: 2019-04-15 Sist oppdatert: 2019-09-04bibliografisk kontrollert
Maamar, Z., Baker, T., Faci, N., Al-Khafajiy, M., Ugljanin, E., Atif, Y. & Sellami, M. (2019). Weaving Cognition into the Internet-of-Things: Application to Water Leaks. Cognitive Systems Research, 56, 233-245
Åpne denne publikasjonen i ny fane eller vindu >>Weaving Cognition into the Internet-of-Things: Application to Water Leaks
Vise andre…
2019 (engelsk)Inngår i: Cognitive Systems Research, ISSN 2214-4366, E-ISSN 1389-0417, Vol. 56, s. 233-245Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Despite the growing interest in the Internet-of-Things, many organizations remain reluctant to integrating things into their business processes. Different reasons justify this reluctance including things’ limited capabilities to act upon the cyber-physical surrounding in which they operate. To address this specific limitation, this paper examines thing empowerment with cognitive capabilities that would make them for instance, selective of the next business processes in which they would participate. The selection is based on things’ restrictions like limitedness and goals to achieve like improved reputation. For demonstration purposes, water leaks are used as a case study. A BPEL-based business process driving the fixing of water leaks is implemented involving different cognitive things like moisture sensor.

sted, utgiver, år, opplag, sider
Elsevier, 2019
Emneord
Business Process, Cognitive Computing, Internet of Things, Water Leak
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS)
Identifikatorer
urn:nbn:se:his:diva-16807 (URN)10.1016/j.cogsys.2019.04.001 (DOI)000468975100028 ()2-s2.0-85064498686 (Scopus ID)
Merknad

Corrigendum in: Cognitive Systems Research, Volume 58, December 2019, Page 54. doi:10.1016/j.cogsys.2019.05.006

Tilgjengelig fra: 2019-04-23 Laget: 2019-04-23 Sist oppdatert: 2019-06-19bibliografisk kontrollert
Jiang, Y., Jeusfeld, M. A., Atif, Y., Ding, J., Brax, C. & Nero, E. (2018). A Language and Repository for Cyber Security of Smart Grids. In: Selmin Nurcan, Pontus Johnson (Ed.), 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018): . Paper presented at 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC), Stockholm, Sweden, October 16-19, 2018 (pp. 164-170). Los Alamitos, CA: IEEE
Åpne denne publikasjonen i ny fane eller vindu >>A Language and Repository for Cyber Security of Smart Grids
Vise andre…
2018 (engelsk)Inngår i: 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018) / [ed] Selmin Nurcan, Pontus Johnson, Los Alamitos, CA: IEEE, 2018, s. 164-170Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Power grids form the central critical infrastructure in all developed economies. Disruptions of power supply can cause major effects on the economy and the livelihood of citizens. At the same time, power grids are being targeted by sophisticated cyber attacks. To counter these threats, we propose a domain-specific language and a repository to represent power grids and related IT components that control the power grid. We apply our tool to a standard example used in the literature to assess its expressiveness.

sted, utgiver, år, opplag, sider
Los Alamitos, CA: IEEE, 2018
Serie
Proceedings (IEEE International Enterprise Distributed Object Computing Conference), ISSN 2325-6354, E-ISSN 2325-6362
Emneord
cyber security, enterprise architecture, domain-specific language, taxonomy
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS); Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-16403 (URN)10.1109/EDOC.2018.00029 (DOI)2-s2.0-85059076918 (Scopus ID)978-1-5386-4139-2 (ISBN)
Konferanse
2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC), Stockholm, Sweden, October 16-19, 2018
Prosjekter
EU ISF Project A431.678/2016 ELVIRA
Merknad

Funded by EU Internal Security Funds

Tilgjengelig fra: 2018-11-16 Laget: 2018-11-16 Sist oppdatert: 2019-02-08bibliografisk kontrollert
Jiang, Y., Atif, Y. & Ding, J. (2018). Agent Based Testbed Design for Cyber Vulnerability Assessment in Smart-Grids. In: : . Paper presented at CySeP summer school 2018/SWITIS, CySeP, 2018.
Åpne denne publikasjonen i ny fane eller vindu >>Agent Based Testbed Design for Cyber Vulnerability Assessment in Smart-Grids
2018 (engelsk)Konferansepaper, Poster (with or without abstract) (Annet vitenskapelig)
Abstract [en]

Smart grid employs Information and Communication Technology (ICT) infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolution is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the development of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for designing testbeds to allow the simulation of cyberattacks in order to evaluate the vulnerability and the impact of cyber threat attacks. The proposed framework uses data reported from multiple smart grid components at different smart grid architecture layers, including physical, control, and cyber layers. The multi-agent based framework proposed in this paper would analyze the conglomeration of these data reports to assert malicious attacks.

HSV kategori
Forskningsprogram
INF303 Informationssäkerhet; Distribuerade realtidssystem (DRTS)
Identifikatorer
urn:nbn:se:his:diva-16069 (URN)
Konferanse
CySeP summer school 2018/SWITIS, CySeP, 2018
Prosjekter
ELVIRA (http://www.his.se/en/Research/informatics/Distributed-Real-Time-Systems/Infrastructure-resilience/)
Tilgjengelig fra: 2018-08-22 Laget: 2018-08-22 Sist oppdatert: 2018-11-21bibliografisk kontrollert
Maamar, Z., Baker, T., Faci, N., Ugljanin, E., Atif, Y., Al-Khafajiy, M. & Sellami, M. (2018). Cognitive Computing Meets The Internet of Things. In: Leszek Maciaszek, Marten van Sinderen (Ed.), Proceedings of the 13th International Conference on Software Technologies: . Paper presented at 13th International Conference on Software Technologies, ICSOFT, Porto, Portugal, July 26-28, 2018 (pp. 741-746). SciTePress
Åpne denne publikasjonen i ny fane eller vindu >>Cognitive Computing Meets The Internet of Things
Vise andre…
2018 (engelsk)Inngår i: Proceedings of the 13th International Conference on Software Technologies / [ed] Leszek Maciaszek, Marten van Sinderen, SciTePress, 2018, s. 741-746Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This paper discusses the blend of cognitive computing with the Internet-of-Things that should result into developing cognitive things. Today’s things are confined into a data-supplier role, which deprives them from being the technology of choice for smart applications development. Cognitive computing is about reasoning, learning, explaining, acting, etc. In this paper, cognitive things’ features include functional and non-functional restrictions along with a 3 stage operation cycle that takes into account these restrictions during reasoning, adaptation, and learning. Some implementation details about cognitive things are included in this paper based on a water pipe case-study.

sted, utgiver, år, opplag, sider
SciTePress, 2018
Emneord
Business process, Cognitive computing, Internet-of-Things
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS)
Identifikatorer
urn:nbn:se:his:diva-15352 (URN)10.5220/0006877507750780 (DOI)978-989-758-320-9 (ISBN)
Konferanse
13th International Conference on Software Technologies, ICSOFT, Porto, Portugal, July 26-28, 2018
Tilgjengelig fra: 2018-06-06 Laget: 2018-06-06 Sist oppdatert: 2018-12-20bibliografisk kontrollert
Jiang, Y., Ding, J., Atif, Y., Jeusfeld, M., Andler, S., Lindström, B., . . . Haglund, D. (2018). Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project. Skövde: University of Skövde
Åpne denne publikasjonen i ny fane eller vindu >>Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
Vise andre…
2018 (engelsk)Rapport (Annet vitenskapelig)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

sted, utgiver, år, opplag, sider
Skövde: University of Skövde, 2018. s. 22
Serie
IIT Technical Reports ; HS-IIT-TR-18-003
Emneord
Dependencies, Interdependencies, Modelling and Simulation, Influence Factors
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS); Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-15114 (URN)
Prosjekter
ELVIRA
Merknad

HS-IIT-TR-18-003 This is a technical report related to the ELVIRA project www.his.se/elvira

Tilgjengelig fra: 2018-05-02 Laget: 2018-05-02 Sist oppdatert: 2019-03-05bibliografisk kontrollert
Atif, Y., Jiang, Y., Jeusfeld, M. A., Ding, J., Lindström, B., Andler, S. F., . . . Lindström, B. (2018). Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project. Skövde: University of Skövde
Åpne denne publikasjonen i ny fane eller vindu >>Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project
Vise andre…
2018 (engelsk)Rapport (Annet vitenskapelig)
Abstract [en]

Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

sted, utgiver, år, opplag, sider
Skövde: University of Skövde, 2018. s. 18
Serie
IIT Technical Reports ; HS-IIT-TR-18-004
Emneord
vulnerability analysis, cyber-threats, cyberphysical systems, clustering, multiagent systems
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS); Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-16092 (URN)
Prosjekter
This research has been supported in part by the EU ISF Project A431.678/2016 ELVIRA (Threat modeling and resilience of critical infrastructures), coordinated by Polismyndigheten/Sweden
Merknad

I publikationen: HS-IIT-18-004

Tilgjengelig fra: 2018-08-29 Laget: 2018-08-29 Sist oppdatert: 2019-02-18bibliografisk kontrollert
Jiang, Y., Atif, Y. & Ding, J. (2018). Data Fusion Framework for Cyber Vulnerability Assessment in Smart Grid.
Åpne denne publikasjonen i ny fane eller vindu >>Data Fusion Framework for Cyber Vulnerability Assessment in Smart Grid
2018 (engelsk)Annet (Annet vitenskapelig)
Abstract [en]

Smart grid adopts ICT to enhance power-delivery management. However, these advanced technologies also introduce an increasing amount of cyber threats. Cyber threats occur because of vulnerabilities throughout smart-grid layers. Each layer is distinguished by typical data flows. For example, power-data stream flows along the physical layer; command data are pushed to and pulled from sensor-control devices, such as RTUs and PLCs. Vulnerabilities expose these data flows to cyber threat via communication networks, such as local control network, vendor network, corporate network and the wider internet. Thus, these data could be used to analyse vulnerabilities against cyber threats. After data collection, data analysis and modelling techniques would be used for vulnerability assessment.

HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS); INF303 Informationssäkerhet
Identifikatorer
urn:nbn:se:his:diva-16070 (URN)
Tilgjengelig fra: 2018-08-22 Laget: 2018-08-22 Sist oppdatert: 2018-09-10bibliografisk kontrollert
Atif, Y. & Chou, C. (2018). Digital Citizenship: Innovations in Education, Practice, and Pedagogy. Educational Technology & Society, 21(1), 152-154
Åpne denne publikasjonen i ny fane eller vindu >>Digital Citizenship: Innovations in Education, Practice, and Pedagogy
2018 (engelsk)Inngår i: Educational Technology & Society, ISSN 1176-3647, E-ISSN 1436-4522, Vol. 21, nr 1, s. 3s. 152-154Artikkel i tidsskrift, Editorial material (Fagfellevurdert) Published
Abstract [en]

There are still disparities in technology-access despite economic pressures and widespread promises to overcome them. The induced digital gap defines the degree of digital citizenship for which, unified policies have yet to be drawn at various educational levels to reduce that gap. The quest for a broad participation to develop digital citizenship competencies needs further investigations into innovative educational approaches, pedagogical methods, and routine practices that foster digital literacy, and narrows the digital divide. This special issue accumulates original theoretical and empirical research contributions across contemporary digital citizenship perspectives. The final selection of the papers explores digital citizenship concepts such as ethics, digital literacy and participation, in various contexts to develop opportunities for a wider engagement in social actions. The international perspectives of contributing authors shed lights on digital citizenship prospects across unique contexts among different nations. 

sted, utgiver, år, opplag, sider
International Forum of Educational Technology & Society, 2018. s. 3
Emneord
Digital citizenship, Digital literacy, Ethics, Education, Pedagogy
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS)
Identifikatorer
urn:nbn:se:his:diva-14615 (URN)000428889400014 ()2-s2.0-85040624185 (Scopus ID)
Tilgjengelig fra: 2018-01-03 Laget: 2018-01-03 Sist oppdatert: 2019-09-04
Atif, Y., Jiang, Y., Lindström, B., Ding, J., Jeusfeld, M., Andler, S., . . . Haglund, D. (2018). Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project. Skövde: University of Skövde
Åpne denne publikasjonen i ny fane eller vindu >>Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project
Vise andre…
2018 (engelsk)Rapport (Annet vitenskapelig)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

sted, utgiver, år, opplag, sider
Skövde: University of Skövde, 2018. s. 16
Serie
IIT Technical Reports ; HS-IIT-TR-18-002
Emneord
Smart grid security, Agent model, Multi-agent system
HSV kategori
Forskningsprogram
Distribuerade realtidssystem (DRTS); Informationssystem (IS)
Identifikatorer
urn:nbn:se:his:diva-15111 (URN)
Prosjekter
Elvira project funded by EU Internal Security Fund (ISF) A431.678-2016
Merknad

HS-IIT-TR-18-002

Tilgjengelig fra: 2018-05-02 Laget: 2018-05-02 Sist oppdatert: 2019-03-05bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-7312-9089