Mikael Asplund

Orcid: 0000-0003-1916-3398

According to our database1, Mikael Asplund authored at least 53 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Provable Non-Frameability for 5G Lawful Interception.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Extending the Authentication Hierarchy with One-Way Agreement.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Remote Attestation Assurance Arguments for Trusted Execution Environments.
Proceedings of the Sat-CPS@CODASPY 2023: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2023

2022
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters.
Proceedings of the Secure IT Systems, 2022

Evaluation of an SDN-based Microservice Architecture.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Decentralized Firmware Attestation for In-Vehicle Networks.
ACM Trans. Cyber Phys. Syst., 2021

UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks.
IEEE Access, 2021

2020
Combining Detection and Verification for Secure Vehicular Cooperation Groups.
ACM Trans. Cyber Phys. Syst., 2020

Blockchain-based event processing in supply chains - A case study at IKEA.
Robotics Comput. Integr. Manuf., 2020

Permissioned blockchains and distributed databases: A performance study.
Concurr. Comput. Pract. Exp., 2020

2019
Decentralized proof of location in vehicular Ad Hoc networks.
Comput. Commun., 2019

Can Microkernels Mitigate Microarchitectural Attacks?
Proceedings of the Secure IT Systems, 2019

A Student's View of Concurrency - A Study of Common Mistakes in Introductory Courses on Concurrency.
Proceedings of the 2019 ACM Conference on International Computing Education Research, 2019

2018
Automatically proving the correctness of vehicle coordination.
ICT Express, 2018

Mitigating Position Falsification Attacks in Vehicular Platooning.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

In-Store Payments Using Bitcoin.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Vouch: A Secure Proof-of-Location Scheme for VANETs.
Proceedings of the 21st ACM International Conference on Modeling, 2018

The future of IoT security: special session.
Proceedings of the International Conference on Embedded Software, 2018

CERTS 2018 Introduction.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

On the impact of sybil attacks in cooperative driving scenarios.
Proceedings of the 2017 IFIP Networking Conference, 2017

Timing-Based Anomaly Detection in SCADA Networks.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Fairness and Incentive Considerations in Energy Apportionment Policies.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

Attitudes and Perceptions of IoT Security in Critical Societal Services.
IEEE Access, 2016

Connectivity-optimal shortest paths using crowdsourced data.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Exploiting Bro for Intrusion Detection in a SCADA System.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Sharing the Cost of Lunch: Energy Apportionment Policies.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Model-Based Membership Verification in Vehicular Platoons.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

2014
Modelling Correlated Mobility.
CoRR, 2014

Cooperative proxies: Optimally trading energy and quality of service in mobile devices.
Comput. Networks, 2014

Poster: Securing vehicular platoon membership.
Proceedings of the 2014 IEEE Vehicular Networking Conference, 2014

Why is fingerprint-based indoor localization still so hard?
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
Reliable broadcast in vehicular ad-hoc networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
Surviving Attacks in Challenged Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Worst-case latency of broadcast in intermittently connected networks.
Int. J. Ad Hoc Ubiquitous Comput., 2012

Trust Evaluation for Participatory Sensing.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2012

A Formal Approach to Autonomous Vehicle Coordination.
Proceedings of the FM 2012: Formal Methods, 2012

Analysing Delay-Tolerant Networks with Correlated Mobility.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Disconnected Discoveries: Availability Studies in Partitioned Networks.
PhD thesis, 2011

Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms.
Proceedings of the 5th International Conference on Next Generation Mobile Applications, 2011

Software-related energy footprint of a wireless broadband module.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

Communication problems in crisis response.
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011

2010
Anomaly Detection and Mitigation for Disaster Area Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Wireless ad hoc dissemination for search and rescue.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

2009
Middleware extensions that trade consistency for availability.
Concurr. Comput. Pract. Exp., 2009

A Partition-Tolerant Manycast Algorithm for Disaster Area Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

2008
Emerging Information Infrastructures: Cooperation in Disasters.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Post-partition reconciliation protocols for maintaining consistency.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Formalising Reconciliation in Partitionable Networks with Distributed Services.
Proceedings of the Rigorous Development of Complex Fault-Tolerant Systems [FP6 IST-511599 RODIN project], 2006


  Loading...