Magnus Almgren

Orcid: 0000-0002-3383-9617

According to our database1, Magnus Almgren authored at least 67 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluation of Open-Source Tools for Differential Privacy.
Sensors, July, 2023

Gridchain: an investigation of privacy for the future local distribution grid.
Int. J. Inf. Sec., 2023

Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

Gap Analysis of ISO/SAE 21434 - Improving the Automotive Cybersecurity Engineering Life Cycle.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Scheduling to the Rescue; Improving ML-Based Intrusion Detection for IoT.
Proceedings of the 16th European Workshop on System Security, 2023

CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Clipaha: A Scheme to Perform Password Stretching on the Client.
IACR Cryptol. ePrint Arch., 2022

Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses.
Comput. Secur., 2022

MicroTL: Transfer Learning on Low-Power IoT Devices.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

MiniLearn: On-Device Learning for Low-Power IoT Devices.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

2021
Spectra: detecting attacks on in-vehicle networks through spectral analysis of CAN-message payloads.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Proposing HEAVENS 2.0 - an automotive risk assessment model.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021

A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical Systems.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Multiple pattern matching for network security applications: Acceleration through vectorization.
J. Parallel Distributed Comput., 2020

A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments.
Int. J. Crit. Infrastructure Prot., 2020

BES: Differentially private event aggregation for large-scale IoT-based systems.
Future Gener. Comput. Syst., 2020

TinyEVM: Off-Chain Smart Contracts on Low-Power IoT Devices.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

<i>Delegation sketch</i>: a parallel design with support for fast and accurate concurrent operations.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

On the performance of commodity hardware for low latency and low jitter packet processing.
Proceedings of the 14th ACM International Conference on Distributed and Event-based Systems, 2020

2019
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks.
CoRR, 2019

IoTLogBlock: Recording Off-line Transactions of Low-Power IoT Devices Using a Blockchain.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Probe into Process-Level Attack Detection in Industrial Environments from a Side-Channel Perspective.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids.
Proceedings of the 15th European Dependable Computing Conference, 2019

Continuous Monitoring meets Synchronous Transmissions and In-Network Aggregation.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Performance of Secure Boot in Embedded Systems.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019

Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure.
Comput. Secur., 2018

CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Data Modelling for Predicting Exploits.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Geometric Monitoring in Action: a Systems Perspective for the Internet of Things.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

The Nuts and Bolts of Deploying Process-Level IDS in Industrial Control Systems.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

Understanding Common Automotive Security Issues and Their Implications.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2018

Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

BES: Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Detecting non-technical energy losses through structural periodic patterns in AMI data.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Harnessing the unknown in advanced metering infrastructure traffic.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

A study on data de-pseudonymization in the smart grid.
Proceedings of the Eighth European Workshop on System Security, 2015

2014
When Smart Cities meet Big Data.
ERCIM News, 2014

METIS: A Two-Tier Intrusion Detection System for Advanced Metering Infrastructures.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Managing your trees: Insights from a metropolitan-scale low-power wireless network.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Online temporal-spatial analysis for detection of critical events in Cyber-Physical Systems.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Cybersecurity in the Smart Grid.
ERCIM News, 2013

Analysis of the impact of data granularity on privacy for the smart grid.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

2011
Remote Control of Smart Meters: Friend or Foe?
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Discussion Panel in conjunction with the 7th European Conference on Computer Network Defense (EC2ND 2011): Security Issues in the Smart Grid.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

Mapping Systems Security Research at Chalmers.
Proceedings of the First SysSec Workshop 2011, 2011

On collection of large-scale multi-purpose datasets on internet backbone links.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Tracking Malicious Hosts on a 10Gbps Backbone Link.
Proceedings of the Information Security Technology for Applications, 2010

Emerging and Future Cyber Threats to Critical Systems.
Proceedings of the Open Research Problems in Network Security, 2010

2008
Techniques for Improving Intrusion Detection.
PhD thesis, 2008

Simplified Interference Modeling in Multi-Cell Multi-Antenna Radio Network Simulations.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A Multi-Sensor Model to Improve Automated Attack Detection.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2006
A fading-insensitive performance metric for a unified link quality model.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

2004
Using Active Learning in Intrusion Detection.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Dependable Intrusion Tolerance: Technology Demo.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
An Architecture for an Adaptive Intrusion-Tolerant Server.
Proceedings of the Security Protocols, 2002

2001
Application-Integrated Data Collection for Security Monitoring.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

2000
A Lightweight Tool for Detecting Web Server Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2000

1998
Capacity and speech quality aspects using adaptive multi-rate (AMR).
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1996
A concept for dynamic neighbor cell list planning in a cellular system.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1994
Adaptive antenna arrays for GSM900/DCS1800.
Proceedings of 44th IEEE Vehicular Technology Conference: Creating Tomorrow's Mobile Systems, 1994

Power control in a cellular system.
Proceedings of 44th IEEE Vehicular Technology Conference: Creating Tomorrow's Mobile Systems, 1994


  Loading...