Browsing NTNU Open by Author "Wolthusen, Stephen"
Now showing items 1-18 of 18
-
A Review of Asset-Centric Threat Modelling Approaches
Nweke, Livinus Obiora; Wolthusen, Stephen (Journal article; Peer reviewed, 2020)Abstract: The threat landscape is constantly evolving. As attackers continue to evolve and seek better methods of compro-mising a system; in the same way, defenders continue to evolve and seek better methods of protecting ... -
A Security Policy Infrastructure for Tactical Service Oriented Architectures
Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ... -
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)Adversarial models are well-established for cryptographic protocols, but distributed real-time protocols have requirements that these abstractions are not intended to cover. The IEEE/IEC 61850 standard for communication ... -
Auditability in IoMT devices
Åsen, Cecilie (Master thesis, 2018)The topics covered in this thesis do not seem to be widely explored before. There is a lot of focus on the security of IoMT, but not so much the auditing capabilities. As this may not actively counter errors or an attack, ... -
Cyber Situational Security Awareness Architecture (CSSA) for Industrial Control Systems
Hellesen, Niclas (Master thesis, 2019)Dette prosjektet legger grunnlaget for en cyber sikkerhets situasjonell forståelses arkitektur for industrielle kontrollsystemer. Videre svarer den på forsknings spørsmål om resultater og kontekst for penetrasjonstesting ... -
Emulating IED In Cyber Range Reference Scenarios
Wist, Tore (Master thesis, 2020)En «Intelligent Electronic Device» (IED) er en programmerbar enhent som er brukt til lesing av verdier og kontroll av det fysiske miljøet i cyber-fysiske systemer. IEDer kan kommunisere med ander systermer og menneske-ma ... -
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda
Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ... -
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber ... -
Live forensics on the Windows 10 secure kernel.
Brendmo, Hans Kristian (Master thesis, 2017)The thesis looks at the internals of the secure kernel, explores ways of performing live forensics on the secure kernel as well as providing information on how to extract a full memory dump from a virtual machine running ... -
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)In recent years, software defined networking (SDN) has been proposed for enhancing the security of industrial control networks. However, its ability to guarantee the quality of service (QoS) requirements of such networks ... -
Precision Time Protocol under Synchronization Attack
Tørseth, Kristian (Master thesis, 2022)Precision Time Protocol IEEE 1588 (PTP) er en synkroniserings protokoll som brukes mye i industrielle kontroll systemer hvor man ønsker en synkroniserings presisjon under et nanosekund(< 0.000001 sekunder). Denne protokollen ... -
Resilience Analysis of Software-Defined Networks Using Queueing Networks
Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ... -
Resilience of Infrastructure Networks Byzantine Consensus, Interdependencies, and Optimisation in Sparse Networks
Weldehawaryat, Goitom Kahsay (Doctoral theses at NTNU;2017:80, Doctoral thesis, 2017)The growing dependence on critical infrastructure systems demands highly available systems that provide secure, resilient, and efficient services, even in the presence of malicious attacks. This thesis investigates the ... -
Securing Tactical Service Oriented Architectures
Gkioulos, Vasileios (Doctoral theses at NTNU;2018:46, Doctoral thesis, 2017)Abstract Research and development across military network technologies is an ongoing task, seeking to satisfy continuously evolving requirements and adversarial models. Beyond distinct implementations or technologies, the ... -
Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the ... -
Security Requirements for the Deployment of Services Across Tactical SOA
Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2017)Service Oriented Architectures (SOA) have been identified as a suitable mediator towards the attainment of the requirements imposed by modern warfare. Earlier studies focused primarily on the strategic domain, or the ... -
Threat Analysis for Smart Homes
Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen (Journal article; Peer reviewed, 2019)The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ... -
Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian (Journal article; Peer reviewed, 2020)Abstract: In recent years, there has been an increase in the application of attribute-based access control (ABAC) in electronic health (e-health) systems. E-health systems are used to store a patient’s electronic version ...