Hoppa till huvudinnehållet
Till KTH:s startsida Till KTH:s startsida

Publikationer av Engla Rencelj Ling

Refereegranskade

Artiklar

[1]
S. Katsikeas et al., "Empirical evaluation of a threat modeling language as a cybersecurity assessment tool," Computers & security (Print), vol. 140, 2024.
[2]
E. Ling och M. Ekstedt, "A threat modeling language for generating attack graphs of substation automation systems," International Journal of Critical Infrastructure Protection, s. 100601-100601, 2023.
[3]
E. Rencelj Ling och M. Ekstedt, "Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data," SN Computer Science, vol. 4, no. 3, 2023.
[4]
S. Hacks et al., "powerLang : a probabilistic attack simulation language for the power domain," Energy Informatics, vol. 3, no. 1, 2020.

Konferensbidrag

[5]
E. Rencelj Ling och M. Ekstedt, "Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities," i Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 2022, s. 96-107.
[6]
E. Rencelj Ling et al., "Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis," i ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
[7]
S. Hacks et al., "Towards a Systematic Method for Developing Meta Attack Language Instances," i Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6–7, 2022, Proceedings, 2022, s. 139-154.
[8]
E. Rencelj Ling och M. Ekstedt, "Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language," i Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2021.
[9]
E. Ling, R. Lagerström och M. Ekstedt, "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain," i Critical Information Infrastructures Security, CRITIS. 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, 2020, s. 47-58.
[10]
X. Mao et al., "Conceptual Abstraction of Attack Graphs : a Use Case of securiCAD," i Graphical Models for Security. GraMSec 2019., 2019, s. 186-202.
Senaste synkning med DiVA:
2024-04-28 00:39:10