Skip to main content

Showing 1–5 of 5 results for author: Asplund, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.19154  [pdf, other

    cs.CR

    Towards Privacy-Preserving Anomaly-Based Intrusion Detection in Energy Communities

    Authors: Zeeshan Afzal, Giovanni Gaggero, Mikael Asplund

    Abstract: Energy communities consist of decentralized energy production, storage, consumption, and distribution and are gaining traction in modern power systems. However, these communities may increase the vulnerability of the grid to cyber threats. We propose an anomaly-based intrusion detection system to enhance the security of energy communities. The system leverages deep autoencoders to detect deviation… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

    Comments: Under Submission

  2. arXiv:2501.05923  [pdf, other

    cs.CR

    From Balance to Breach: Cyber Threats to Battery Energy Storage Systems

    Authors: Frans Öhrström, Joakim Oscarsson, Zeeshan Afzal, János Dani, Mikael Asplund

    Abstract: Battery energy storage systems are an important part of modern power systems as a solution to maintain grid balance. However, such systems are often remotely managed using cloud-based control systems. This exposes them to cyberattacks that could result in catastrophic consequences for the electrical grid and the connected infrastructure. This paper takes a step towards advancing understanding of t… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

    Comments: Submitted to Energy Informatics on January 9th 2025

  3. arXiv:2412.12745  [pdf, other

    cs.CR cs.SE

    Automated Penetration Testing: Formalization and Realization

    Authors: Charilaos Skandylas, Mikael Asplund

    Abstract: Recent changes in standards and regulations, driven by the increasing importance of software systems in meeting societal needs, mandate increased security testing of software systems. Penetration testing has been shown to be a reliable method to asses software system security. However, manual penetration testing is labor-intensive and requires highly skilled practitioners. Given the shortage of cy… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

    Comments: Submitted to Computers and Security December 17th 2024

  4. arXiv:2105.02664  [pdf, other

    cs.CR

    Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol

    Authors: Felipe Boeira, Mikael Asplund

    Abstract: Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of t… ▽ More

    Submitted 25 November, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

  5. arXiv:1409.6431  [pdf, other

    cs.NI

    Modelling Correlated Mobility

    Authors: Mikael Asplund, Simin Nadjm-Tehrani

    Abstract: When nodes in a mobile network cluster together or move according to common external factors (e.g., cars that follow the road network), the resulting contact patterns become correlated. In this work we address the question of modelling such correlated mobility movements for the analysis of intermittently connected networks. We propose to use the concept of node colouring time to characterise dynam… ▽ More

    Submitted 23 September, 2014; originally announced September 2014.