Skip to main content

Showing 1–6 of 6 results for author: Czekster, R M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.08479  [pdf, other

    cs.CE

    Cyber-physical and business perspectives using Federated Digital Twins in multinational and multimodal transportation systems

    Authors: Ricardo M. Czekster, Alexeis Garcia Perez, Manolya Kavakli-Thorne, Seif Allah El Mesloul Nasri, Siraj Shaikh

    Abstract: Digital Twin (DT) technologies promise to remove cyber-physical barriers in systems and services and provide seamless management of distributed resources effectively. Ideally, full-fledged instantiations of DT offer bi-directional features for physical-virtual representations, tackling data governance, risk assessment, security and privacy protections, resilience, and performance, to name a few ch… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  2. arXiv:2409.03405  [pdf, other

    cs.SE cs.CR

    Continuous risk assessment in secure DevOps

    Authors: Ricardo M. Czekster

    Abstract: DevOps (development and operations), has significantly changed the way to overcome deficiencies for delivering high-quality software to production environments. Past years witnessed an increased interest in embedding DevOps with cybersecurity in an approach dubbed secure DevOps. However, as the practices and guidance mature, teams must consider them within a broader risk context. We argue here how… ▽ More

    Submitted 5 September, 2024; originally announced September 2024.

  3. arXiv:2204.03676  [pdf, other

    cs.CR cs.SE

    cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

    Authors: Ricardo M. Czekster, Roberto Metere, Charles Morisset

    Abstract: Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX. STIX offers facilities to create, visualise and share models; however, even a moderately simple project can be represented in STIX as a quite complex graph, suggesting to spread CTI across multiple… ▽ More

    Submitted 12 May, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: 11 pages, 8 figures, technical report

  4. arXiv:2105.02905  [pdf, other

    cs.CR cs.NI

    Securing the Electric Vehicle Charging Infrastructure

    Authors: Roberto Metere, Myriam Neaimeh, Charles Morisset, Carsten Maple, Xavier Bellekens, Ricardo M. Czekster

    Abstract: Electric Vehicles (EVs) can help alleviate our reliance on fossil fuels for transport and electricity systems. However, charging millions of EV batteries requires management to prevent overloading the electricity grid and minimise costly upgrades that are ultimately paid for by consumers. Managed chargers, such as Vehicle-to-Grid (V2G) chargers, allow control over the time, speed and direction o… ▽ More

    Submitted 6 July, 2022; v1 submitted 6 May, 2021; originally announced May 2021.

    Comments: 42 pages, white paper

  5. arXiv:2011.07968  [pdf, other

    cs.PF

    Tools for modelling and simulating the Smart Grid

    Authors: Ricardo M. Czekster

    Abstract: The Smart Grid (SG) is a Cyber-Physical System (CPS) considered a critical infrastructure divided into cyber (software) and physical (hardware) counterparts that complement each other. It is responsible for timely power provision wrapped by Information and Communication Technologies (ICT) for handling bi-directional energy flows in electric power grids. Enacting control and performance over the ma… ▽ More

    Submitted 19 November, 2020; v1 submitted 16 November, 2020; originally announced November 2020.

    Comments: 16 pages, 1 table, 1 figure

  6. arXiv:1911.12757  [pdf, other

    eess.SY cs.CR

    Modelling Load-Changing Attacks in Cyber-Physical Systems

    Authors: Luca Arnaboldi, Ricardo M. Czekster, Roberto Metere, Charles Morisset

    Abstract: Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples are Internet-of-Things (IoT) or sensing software embedded in appliances or even specialised meters that measure and respond to electricity demands in smart grids. Due to their pervasive nature, they are usually chosen as recipients for larger scope cyber-security attacks. Those promote system-wide d… ▽ More

    Submitted 17 December, 2019; v1 submitted 28 November, 2019; originally announced November 2019.

    Comments: 15 pages