his.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Alternative names
Publications (10 of 23) Show all publications
Atif, Y., Ding, J., Lindström, B., Jeusfeld, M., Andler, S. F., Yuning, J., . . . Gustavsson, P. M. (2017). Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection. In: : . Paper presented at The International Conference on Critical Information Infrastructures Security, CRITIS 2017, Lucca, Italy, October 8-13, 2017.
Open this publication in new window or tab >>Cyber-Threat Intelligence Architecture for Smart-Grid Critical Infrastructures Protection
Show others...
2017 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dysfunctionalities with catastrophic socio-economical implications. We propose a comprehensive architectural model to support the development of incident management tools that provide situation-awareness and cyber-threats intelligence for CI protection, with a special focus on smart-grid CI. The goal is to unleash forensic data from CPS-based CIs to perform some predictive analytics. In doing so, we use some AI (Artificial Intelligence) paradigms for both data collection, threat detection, and cascade-effects prediction. 

Keywords
critical infrastructures, cyber-threat, situation awareness, smart-grid, machine-learning, artificial intelligence, multi-agent systems
National Category
Computer Sciences Embedded Systems Energy Systems Remote Sensing Infrastructure Engineering
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-14516 (URN)
Conference
The International Conference on Critical Information Infrastructures Security, CRITIS 2017, Lucca, Italy, October 8-13, 2017
Projects
ELVIRA
Available from: 2017-11-28 Created: 2017-11-28 Last updated: 2018-02-01Bibliographically approved
Riveiro, M., Gustavsson, P. M., Lebram, M., Bengstsson, M., Blomqvist, P. & Wallinius, M. (2016). Enhanced Training through Interactive Visualization of Training Objectives and Models. In: Proceedings of the STO-MP-MSG-143, Ready for the Predictable, Prepared for the Unexpected: M&S for Collective Defence in Hybrid Environments and Hybrid Conflicts. Paper presented at 2016 NATO Modelling & Simulation Group (NMSG) Symposium, Bucharest, Romania, October 20-21, 2016. NATO Science & Technology Organization (STO)
Open this publication in new window or tab >>Enhanced Training through Interactive Visualization of Training Objectives and Models
Show others...
2016 (English)In: Proceedings of the STO-MP-MSG-143, Ready for the Predictable, Prepared for the Unexpected: M&S for Collective Defence in Hybrid Environments and Hybrid Conflicts, NATO Science & Technology Organization (STO) , 2016Conference paper, Published paper (Refereed)
Abstract [en]

Military forces operate in complex and dynamic environments [1] where bad decisions might have fatal consequences. A key ability of the commander, team and individual warfighter is to quickly adapt to novel situations. Live, Virtual and Constructive training environments all provide elements of best practices for this type of training. However, many of the virtual training are designed without thorough consideration of the effectiveness and efficiency of embedded instructional strategies [2], and without considering the cognitive capabilities and limitations of trainees. As highlighted recently by Stacy and Freeman [3], large military training exercises require a significant commitment of resources, and to net a return on that investment, training scenarios for these events should systematically address well-specified training objectives, even if they often, do not.

In order to overcome these shortcomings with both Live and Virtual training systems and following our previous work [4,5,6], this paper presents a design solution for a proof-of-concept prototype that visualizes and manages training objectives and performance measures, at individual and collective levels. To illustrate its functionality we use real-world data from Live training exercises. Finally, this paper discusses how to learn from previous training experiences using data mining methods in order to build training models to provide instructional personalized feedback to trainees.

Place, publisher, year, edition, pages
NATO Science & Technology Organization (STO), 2016
National Category
Computer Sciences
Research subject
Technology; Skövde Artificial Intelligence Lab (SAIL); Interaction Lab (ILAB)
Identifiers
urn:nbn:se:his:diva-13129 (URN)978-92-837-2060-7 (ISBN)
Conference
2016 NATO Modelling & Simulation Group (NMSG) Symposium, Bucharest, Romania, October 20-21, 2016
Projects
NOVA 20140294 (Knowledge Foundation)
Funder
Knowledge Foundation, 20140294
Available from: 2016-11-22 Created: 2016-11-22 Last updated: 2018-03-28Bibliographically approved
Rego, I. d., Amorim, J. d., Gustavsson, P. M. & Andler, S. F. (2015). Multimedia production projects: Relevant issues and possible models for mobile learning. In: Mohamed Ally and Badrul H. Khan (Ed.), International Handbook of E-Learning Volume 2: Implementation and Case Studies (pp. 69-76). New York: Routledge
Open this publication in new window or tab >>Multimedia production projects: Relevant issues and possible models for mobile learning
2015 (English)In: International Handbook of E-Learning Volume 2: Implementation and Case Studies / [ed] Mohamed Ally and Badrul H. Khan, New York: Routledge, 2015, p. 69-76Chapter in book (Refereed)
Place, publisher, year, edition, pages
New York: Routledge, 2015
National Category
Computer Sciences Media and Communication Technology
Identifiers
urn:nbn:se:his:diva-13058 (URN)000383667900009 ()2-s2.0-84957403007 (Scopus ID)978-1-315-76090-2 (ISBN)978-1-138-79372-9 (ISBN)
Available from: 2016-10-27 Created: 2016-10-27 Last updated: 2018-01-14Bibliographically approved
Amorim, J. A., Yano, E. T., Åhlfeldt, R.-M., Andler, S. F. & Gustavsson, P. M. (2014). Awareness and training: Identification of relevant security skills and competencies. In: Claudio da Rocha Brito, Melany M. Ciampi (Ed.), Engineering Education in a Technology-Dependent World: Book of Abstracts. Paper presented at INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal (pp. 37). Guimarães: INTERTECH
Open this publication in new window or tab >>Awareness and training: Identification of relevant security skills and competencies
Show others...
2014 (English)In: Engineering Education in a Technology-Dependent World: Book of Abstracts / [ed] Claudio da Rocha Brito, Melany M. Ciampi, Guimarães: INTERTECH , 2014, , p. 57p. 37-Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.

Place, publisher, year, edition, pages
Guimarães: INTERTECH, 2014. p. 57
Series
Proceedings of International Conference on Engineering and Technology Education, ISSN 2317-4382 ; Vol 13
National Category
Information Systems
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-9920 (URN)978-85-65992-28-2 (ISBN)978-85-66680-28-7 (ISBN)
Conference
INTERTECH'2014 - XIII International Conference on Engineering and Technology Education, March 16-19, 2014, Guimarães, portugal
Available from: 2014-09-09 Created: 2014-09-09 Last updated: 2018-01-11Bibliographically approved
Amorim, J. A., Hendrix, M., Andler, S. F., Llinas, J., Gustavsson, P. M. & Brodin, M. (2013). Cyber Security Training Perspectives. In: : . Paper presented at 2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013.
Open this publication in new window or tab >>Cyber Security Training Perspectives
Show others...
2013 (English)Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Building comprehensive cyber security strategies to protect people, infrastructure and assets demands research on methods and practices to reduce risks. Once the methods and practices are identified, there is a need to develop training for the manystakeholders involved, from security experts to the end user. In thispaper, we discuss new approaches for training, which includes the development of serious games for training on cyber security. The identification of the theoretical framework to be used for situation and threat assessment receives special consideration.

Keywords
Cyber Security, Information Fusion, Serious Games, Training
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:his:diva-10363 (URN)
Conference
2013 Annual Computer Security Applications Conference (ACSAC), New Orleans, December 9–13, 2013
Available from: 2014-12-09 Created: 2014-12-09 Last updated: 2018-01-11Bibliographically approved
Amorim, J. A., Åhlfeldt, R.-M., Gustavsson, P. M. & Andler, S. F. (2013). Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem. In: Joel Brynielsson and Fredrik Johansson (Ed.), European Intelligence and Security Informatics Conference (EISIC), Proceedings CD: . Paper presented at 4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden (pp. 139-142). IEEE conference proceedings, Article ID 6657140.
Open this publication in new window or tab >>Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem
2013 (English)In: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD / [ed] Joel Brynielsson and Fredrik Johansson, IEEE conference proceedings, 2013, p. 139-142, article id 6657140Conference paper, Published paper (Refereed)
Abstract [en]

There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2013
Keywords
big data, privacy, security, training
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-8558 (URN)10.1109/EISIC.2013.30 (DOI)2-s2.0-84892164943 (Scopus ID)978-0-7695-5062-6 (ISBN)
Conference
4th European Intelligence and Security Informatics Conference (EISIC). August 12-14, 2013. Information Technology Center ITC at Uppsala University. Uppsala, Sweden
Available from: 2013-10-21 Created: 2013-10-21 Last updated: 2018-01-11Bibliographically approved
Gustavsson, P. M. (2011). Modelling, Formalising, and Implementing Intent in Command and Control Systems. (Doctoral dissertation). De Montfort University, UK
Open this publication in new window or tab >>Modelling, Formalising, and Implementing Intent in Command and Control Systems
2011 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

Intent is a fundamental element in military Command and Control (C2) systems. The ability for a commander to communicate Intent is vital to lead subordinates so that the overall mission is completed in the best possible way. However, the expressiveness of Intent is limited in current C2 systems. The current data exchange models are not capable of representing Intent in a machine interpretable format.

An essential problem to overcome before Intent can be inserted into C2 systems, is to define it to a sufficient level of detail, since different definitions of Intent exist. If this problem can be overcome, the next problem is to represent Intent in such a way that it fits with existing C2 formalisms. The final problem is to what degree the proposed representation of Intent can be inserted into existing and future C2 systems.

This thesis presents how to model and formalise Intent to such a degree that it can be communicated and automatically processed in military C2 systems. The contributions are: a literature review over Intent in C2; a model that captures and relates Intent to key information elements and processes in C2; a formalisation of Intent into a computational tractable representation covering the information elements defined in the developed model; an implementation of the model and formalism into an architectural design for Intent in C2 systems; and a series of demonstrations of the implementation in current C2 systems and simulators that show that the suggested model, formalism and implementation is suitable to represent Intent to such degree that Intent can be represented, exchanged, visualised and executed within current and forthcoming C2 systems.

Place, publisher, year, edition, pages
De Montfort University, UK, 2011. p. 356
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-5646 (URN)
Available from: 2012-03-27 Created: 2012-03-27 Last updated: 2018-01-12Bibliographically approved
Gustavsson, P. M., Hieb, M. R., Moore, P., Eriksson, P. & Niklasson, L. (2011). Operations Intent and Effects Model. The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology, 8(1), 37-59
Open this publication in new window or tab >>Operations Intent and Effects Model
Show others...
2011 (English)In: The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology, ISSN 1548-5129, E-ISSN 1557-380X, Vol. 8, no 1, p. 37-59Article in journal (Refereed) Published
Abstract [en]

Military missions in the 21st century are characterized by combinations of traditional symmetric conventional warfare, irregular warfare, and operations other than war. The inherent uncertainty in an actual mission and the variety of potential organizations (e.g. multi-agency, non-governmental, private volunteer, international, international corporations) from several countries that support the mission makes collaboration and co-ordination a key capability for command and control. The ability to communicate and automatically process intent and effects is vital in order for a commander to cooperate with other organizations and agencies and lead subordinates in such a way that the overall mission is completed in the best possible way, including exploitation of fleeting opportunities, i.e. enable for self-synchronization amongst teams and allow for subordinate initiatives. However, intent and effects are often absent in the current and forthcoming digitalized information models, and if intent and effects are present it is likely to be found that the representations are made as free-text fields based on natural language. However, such messages are very difficult to disambiguate, particularly for automated machine systems. The overall objective for the Operations Intent and Effects Model is to support operational and simulated systems by a conceptual intent and effects model and a formalism that is human and machine interpretable.

Place, publisher, year, edition, pages
Sage Publications, 2011
Keywords
command and control, decision support, effects, intent, simulation
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-5176 (URN)10.1177/1548512910379477 (DOI)2-s2.0-84858982297 (Scopus ID)
Available from: 2011-07-01 Created: 2011-07-01 Last updated: 2018-01-12Bibliographically approved
Fooladvandi, F., Brax, C., Gustavsson, P. & Fredin, M. (2009). Signature-based activity detection based on Bayesian networks acquired from expert knowledge. In: Proceedings of the 12th International Conference on Information Fusion (FUSION 2009): . Paper presented at Fusion 2009 : the 12th International Conference on Information Fusion : Grand Hyatt Seattle, Seattle, Washington, USA, 6-9 July, 2009 (pp. 436-443). ISIF
Open this publication in new window or tab >>Signature-based activity detection based on Bayesian networks acquired from expert knowledge
2009 (English)In: Proceedings of the 12th International Conference on Information Fusion (FUSION 2009), ISIF , 2009, p. 436-443Conference paper, Published paper (Refereed)
Abstract [en]

 

The maritime industry is experiencing one of its longest and fastest periods of growth. Hence, the global maritime surveillance capacity is in a great need of growth as well. The detection of vessel activity is an important objective of the civil security domain. Detecting vessel activity may become problematic if audit data is uncertain. This paper aims to investigate if Bayesian networks acquired from expert knowledge can detect activities with a signature-based detection approach. For this, a maritime pilot-boat scenario has been identified with a domain expert. Each of the scenario’s activities has been divided up into signatures where each signature relates to a specific Bayesian network information node. The signatures were implemented to find evidences for the Bayesian network information nodes. AIS-data with real world observations have been used for testing, which have shown that it is possible to detect the maritime pilot-boat scenario based on the taken approach.

 

Place, publisher, year, edition, pages
ISIF, 2009
Keywords
Signature-based detection, Bayesian networks, Knowledge elicitation, Maritime situation awareness, Information fusion
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-3414 (URN)000273560000057 ()2-s2.0-70449356773 (Scopus ID)978-0-9824438-0-4 (ISBN)
Conference
Fusion 2009 : the 12th International Conference on Information Fusion : Grand Hyatt Seattle, Seattle, Washington, USA, 6-9 July, 2009
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2018-01-13Bibliographically approved
Andler, S. F., Fredin, M., Gustavsson, P. M., van Laere, J., Nilsson, M. & Svenson, P. (2009). SMARTracIn: a concept for spoof resistant tracking of vessels and detection of adverse intentions. In: Edward M. Carapezza (Ed.), Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII: . Paper presented at Conference on Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII : Orlando, FL : APR 15-17, 2009 (pp. 73050G-1-73050G-9). SPIE - International Society for Optical Engineering, Article ID 73050G.
Open this publication in new window or tab >>SMARTracIn: a concept for spoof resistant tracking of vessels and detection of adverse intentions
Show others...
2009 (English)In: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII / [ed] Edward M. Carapezza, SPIE - International Society for Optical Engineering, 2009, p. 73050G-1-73050G-9, article id 73050GConference paper, Published paper (Refereed)
Abstract [en]

The aim of maritime surveillance systems is to detect threats earlyenough to take appropriate actions. We present the results ofa study on maritime domain awareness performed during the fallof 2008. We analyze an identified capability gap of worldwidesurveillance in the maritime domain, and report from a userworkshop addressing the identified gap. We describe a SMARTracIn conceptsystem that integrates information from surveillance systems with background knowledgeon normal conditions to help users detect and visualize anomaliesin vessel traffic. Land-based systems that cover the coastal watersas well as airborne, space-borne and ships covering open seaare considered. Sensor data are combined with intelligence information fromship reporting systems and databases. We describe how information fusion,anomaly detection and semantic technology can be used to helpusers achieve more detailed maritime domain awareness. Human operators area vital part of this system and should be activecomponents in the fusion process. We focus on the problemof detecting anomalous behavior in ocean-going traffic, and a roomand door segmentation concept to achieve this. This requires theability to identify vessels that enter into areas covered bysensors as well as the use of information management systemsthat allow us to quickly find all relevant information.

Place, publisher, year, edition, pages
SPIE - International Society for Optical Engineering, 2009
Series
Proceedings of SPIE, ISSN 0277-786X ; Volume 7305
Keywords
Maritime domain awareness, tracking, information fusion, early warning
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
urn:nbn:se:his:diva-3953 (URN)10.1117/12.818567 (DOI)000292552700011 ()2-s2.0-69649086095 (Scopus ID)9780819475718 (ISBN)
Conference
Conference on Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII : Orlando, FL : APR 15-17, 2009
Available from: 2010-05-24 Created: 2010-05-20 Last updated: 2018-01-12Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9423-9079

Search in DiVA

Show all publications