• Cyber Physical Defense Framework for Distributed Smart Grid Applications 

      Sinha, Ayush; Mohandas, Manasi; Pandey, Pankaj; Vyas, O.P. (Journal article; Peer reviewed, 2021)
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Risk Assessment For Ships (CRASH) 

      Oruc, Aybars; Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
    • Cyber Risk Assessment for SHips (CRASH) 

      Oruc, Aybars; Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2024)
      The maritime industry is undergoing a digital transformation, with an increasing integration of Information Technology (IT) and Operational Technology (OT) systems on modern vessels. Its multiple benefits notwithstanding, ...
    • Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth 

      Amro, Ahmed Walid; Gkioulos, Vasileios (Peer reviewed; Journal article, 2022)
      Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways. The novelty of the APS concept influenced ...
    • Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review 

      Larsen, Marie Haugli; Lund, Mass Soldal (Peer reviewed; Journal article, 2021)
      This paper aims to present an approach to investigate cyber risk perception with use of recognized psychological models, and to give an overview of state-of-the-art research within the field of cyber risk perception in ...
    • Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems 

      Kavallieratos, Georgios; Spathoulas, Georgios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      The increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other ...
    • Cyber security awareness and culture in rural Norway 

      Gunleifsen, Håkon (Research report, 2018)
      Understanding the level of security awareness, the perception, and the culture of users in aspects related to security, is crucial for the development of suitable measures towards their protection and the protection of the ...
    • Cyber security culture as a resilience-promoting factor for human-centered Machine Learning and Zero-defect Manufacturing environments 

      Mitcheltree, Christina Marie; Mugurusi, Godfrey; Holtskog, Halvor (Peer reviewed; Journal article, 2023)
      Humans have often been perceived as a leading cause of error in Zero-defect manufacturing (ZDM) processes. There is thus a reduction of human interventions in the deployment of industry 4.0 (I4.0) technologies used for ZDM ...
    • Cyber security education for children through gamification: research plan and perspectives 

      Quayyum, Farzana (Chapter, 2020)
      With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, ...
    • Cyber Security Issues in Navigation Systems of Marine Vessels From Control Perspective 

      Hassani, Vahid; Crasta, Naveena; Pascoal, Antonio (Chapter, 2017)
      Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time ...
    • Cyber security risk assessment of a DDoS attack 

      Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V (Journal article; Peer reviewed, 2016)
      This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber Trust in the Norwegian Online Flea Market: An Ethnographic Study on Fraud 

      Pan, Yushan (Chapter, 2020)
      This work-in-progress paper reports an ethnographic study on how cyber trust could be designed to prevent online fraud. A yearlong ethnographic study was conducted with a group of victims who were scammed in online shopping. ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cyber-conformity and safety: the groupthink dilemma 

      Størseth, Fred (Journal article; Peer reviewed, 2017)
      The 'capable group' is part of the ethos in resilience-based safety management. Group ideas draw upon psychology. But, what if the psychological blueprints no longer apply? My thesis is that we are changed by cyber-conformity: ...
    • Cyber-physical Hardening of the DigitalWater Infrastructure 

      Cali, Umit; Catak, Ferhat Özgur; Balogh, Zsolt György; Ugarelli, Rita Maria; Jaatun, Martin Gilje (Chapter, 2023)
      Water supply and drainage systems, which are categorized as critical infrastructure, serve a crucial role in preserving societal health and well-being. Since climate change effects, harsher regulations, population changes, ...
    • Cyber-Physical Waste Identification and Elimination Strategies in the Digital Lean Manufacturing World 

      Romero, David; Gaiardelli, Paolo; Thürer, Matthias; Powell, Daryl; Wuest, Thorsten (Peer reviewed; Journal article, 2019)
      Lean Manufacturing and Industry 4.0 are at times portrait as conflicting paradigms. However, we take the stance that they are two sides of the same coin, and should be considered as mutually beneficial. Based on this ...
    • Cyber-Security Assessment of Power System Digital Components in the Conditions of Hostilities 

      Mishchenko, Denys; Oleinikova, Irina; Ivanko, Dmytro (Chapter, 2023)
      Emergencies, including hostilities, create additional cyber-physical security (CPS) challenges for the operation of digital power system components. This paper showcases the main problems faced by one of the components of ...