Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 60) Show all publications
Seid, E., Busheva, R., Blix, F. & Popov, O. (2025). Advancing Cybersecurity: Semi-Automated Penetration Testing for Enhanced Vulnerability Detection. Procedia Computer Science, 263, 350-358
Open this publication in new window or tab >>Advancing Cybersecurity: Semi-Automated Penetration Testing for Enhanced Vulnerability Detection
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 263, p. 350-358Article in journal (Refereed) Published
Abstract [en]

In the face of increasing cyberattacks, organizations today depend heavily on information technology resources, making regular penetration testing crucial for identifying system vulnerabilities and potential exploits. While automated vulnerability management tools are widely used, they often present challenges such as result interpretation, irrelevant findings, and overwhelming volumes of data that complicate the extraction of critical information. Manual penetration testing, on the other hand, offers greater flexibility, enabling professionals to tailor their methods to the specific characteristics of a given environment. This study focuses on semi-automated penetration testing, blending automated efficiency with manual adaptability, to identify vulnerabilities in a web application, providing insights into optimizing vulnerability detection processes.

Keywords
cybersecurity, penetration testing, manual testing, automated testing, vulnerabilities, tools, severity
National Category
Computer Sciences
Research subject
Computer and Systems Sciences; Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-245870 (URN)10.1016/j.procs.2025.07.043 (DOI)
Available from: 2025-08-22 Created: 2025-08-22 Last updated: 2025-08-28Bibliographically approved
Adesina, A., Seid, E., Blix, F. & Popov, O. (2025). Compliance Standards and Frameworks and Its Implications on Cyber security: A NIS2 Study Within the Swedish Automotive Industries. In: Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1: . Paper presented at ICISSP, Porto, Portugal, 2025 (pp. 367-376). Science and Technology Publications, Lda
Open this publication in new window or tab >>Compliance Standards and Frameworks and Its Implications on Cyber security: A NIS2 Study Within the Swedish Automotive Industries
2025 (English)In: Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1, Science and Technology Publications, Lda , 2025, p. 367-376Conference paper, Published paper (Refereed)
Abstract [en]

Cyber security standards and regulations are pivotal in guiding organizations toward mitigating cyber risks and enhancing their overall security posture. The European Union’s NIS2 Directive, which introduces stringent and comprehensive security requirements, exemplifies a Current regulatory framework designed to address evolving cyber threats. This study critically examines the regulatory, governance, cyber security, and compliance challenges introduced by NIS2 within the Swedish automotive industry. It further explores the strategic integration of NIS2 with existing regulatory frameworks to streamline compliance approaches and foster long term resilience. The findings reveal the increasing complexity and financial implications of compliance, while also identifying significant opportunities to bolster cyber security resilience. This paper underscores the necessity for organizations to adopt proactive and adaptive strategies in response to the dynamic European regulatory landscape. While the focus is on the Swedish automotive sector, the study provides valuable insights that may inform future research into the broader implications of NIS2 across diverse industries and regions within the European Union.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2025
Series
International Conference on Information Systems Security and Privacy, E-ISSN 2184-4356 ; 1
Keywords
Automotive Industry, Complexities, Compliance, Cyber security, Cyber security Frameworks, EU Regulations, NIS2 Directive, Organisational Preparedness, Standards
National Category
Computer Sciences Law
Identifiers
urn:nbn:se:su:diva-243126 (URN)10.5220/0013321200003899 (DOI)2-s2.0-105001818679 (Scopus ID)
Conference
ICISSP, Porto, Portugal, 2025
Available from: 2025-05-12 Created: 2025-05-12 Last updated: 2025-05-12Bibliographically approved
Seid, E., Blix, F. & Popov, O. (2025). Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing. In: Gabriele Oliva, Stefano Panzieri, Bernhard Hämmerli, Federica Pascucci, Luca Faramondi (Ed.), Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers. Paper presented at The 19th International Conference on Critical Information Infrastructures Security (CRITIS 2024), September 18–20, 2024, Rome, Italy. (pp. 269-288). Springer Nature
Open this publication in new window or tab >>Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing
2025 (English)In: Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers / [ed] Gabriele Oliva, Stefano Panzieri, Bernhard Hämmerli, Federica Pascucci, Luca Faramondi, Springer Nature , 2025, p. 269-288Conference paper, Published paper (Refereed)
Abstract [en]

The financial sector is experiencing an increase in cyber incidents, prompting numerous firms to outsource IT infrastructure management. A primary factor contributing to these breaches is that the impacted systems are socio-technical systems (STSs), which include not only technical components such as software and hardware but also physical elements (e.g., robotics, mobility) and social components (e.g., human actors, business processes, and organizational units). Evaluating STS security breaches requires a holistic approach, considering human, organizational, software, and infrastructural elements. The study involves combining strategic factors, including social and organizational dynamics, with technical components such as software and physical infrastructure.

In our previous work, we developed a security attack-monitoring system to tackle these challenges. This framework was developed to monitor, analyze, and model security incidents across the social, cyber, and physical dimensions of cyber-physical systems (CPS). This paper employs the framework to conduct threat-led penetration testing in accordance with the Digital Operational Resilience Act (DORA), thus improving the financial sector’s capacity to address information and communication crises. This study provides important insights into cyberattacks and their impact on the financial sector by examining security breaches reported to the Swedish Civil Contingencies Agency (MSB) by critical service providers. The experiment was performed in collaboration with a prominent Swedish financial institution.

Place, publisher, year, edition, pages
Springer Nature, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349
Keywords
Incident Reporting, DORA, Cybersecurity, Cyber-Resilience, Risk Management, Penetration Testing
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240585 (URN)10.1007/978-3-031-84260-3_16 (DOI)2-s2.0-105000827523 (Scopus ID)978-3-031-84260-3 (ISBN)978-3-031-84259-7 (ISBN)
Conference
The 19th International Conference on Critical Information Infrastructures Security (CRITIS 2024), September 18–20, 2024, Rome, Italy.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-08-22Bibliographically approved
Seid, E., Deniz, I., Blix, F. & Popov, O. (2025). Cyber Supply Chain Resilience: Analyzing ISO, NIST, and NIS2 Frameworks for Mitigating Third-Party Risks. Procedia Computer Science, 263, 591-599
Open this publication in new window or tab >>Cyber Supply Chain Resilience: Analyzing ISO, NIST, and NIS2 Frameworks for Mitigating Third-Party Risks
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 263, p. 591-599Article in journal (Refereed) Published
Abstract [en]

The growing frequency of cyber-attacks on supply chains has jeopardized organizational integrity and data security, underscoring the need to strengthen Cyber Supply Chain Risk Management (CSCRM) frameworks. This paper explores the application, effectiveness, and challenges of three key frameworks—ISO, NIST, and NIS2—in mitigating third-party risks within the cyber supply chain. Using an empirical research approach, data was collected from domain experts in the field of information security. The analysis focuses on how effectively these frameworks enhance organizational data security and the practices surrounding their adoption and implementation. This study contributes valuable insights to CSCRM practices, offering actionable findings for organizations seeking to bolster their cyber defenses. The results also provide policymakers with a deeper understanding of the challenges that need to be addressed for future improvements in CSCRM frameworks.

Keywords
Cyber Supply Chain Risk Management (CSCRM), Third-party cyber risks, Cybersecurity frameworks, ISO, NIST, NIS2
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-245871 (URN)10.1016/j.procs.2025.07.071 (DOI)2-s2.0-105013959898 (Scopus ID)
Available from: 2025-08-22 Created: 2025-08-22 Last updated: 2025-09-09Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2025). Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches. In: Mike Mannion, Tomi Mannisto, Leszek Maciaszek (Ed.), Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE: Volume 1. Paper presented at 20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE2025, 4-6 April 2025, Proto, Portugal. (pp. 822-834). SciTePress
Open this publication in new window or tab >>Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches
2025 (English)In: Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE: Volume 1 / [ed] Mike Mannion, Tomi Mannisto, Leszek Maciaszek, SciTePress , 2025, p. 822-834Conference paper, Published paper (Refereed)
Abstract [en]

Ensuring strong security in Cyber-Physical Systems (CPS) is increasingly essential as these systems become integral to contemporary industrial and societal infrastructures. The increasing prevalence of security risks requires the advancement of conventional security engineering approaches to tackle the distinct problems presented by CPS. This study offers a thorough assessment of the research methodologies, approaches, and strategies used in security engineering for cyber-physical systems over the last fifteen years. The review analyses the design and execution of security solutions, including empirical and conceptual investigations, along with the integration and enhancement of existing methodologies. This study seeks to offer a systematic overview of contemporary developments and pinpoint methodological concerns essential for future research in adaptive and security engineering -driven for CPS through an analysis of diverse literature. This study enhances the current discussion by providing a thorough analysis of the research environment, demonstrating the requirement for new and contextually relevant security engineering methodologies.

Place, publisher, year, edition, pages
SciTePress, 2025
Series
Proceedings of the International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), E-ISSN 2184-4895
Keywords
Cyber-Physical Systems Security, Cybersecurity Frameworks, Security Model, Quantitative Research, Qualitative Research, Cyber-Physical System, Security Engineering, Threat Modeling, Cyber Risk.
National Category
Software Engineering
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-243644 (URN)10.5220/0013478100003928 (DOI)978-989-758-742-9 (ISBN)
Conference
20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE2025, 4-6 April 2025, Proto, Portugal.
Available from: 2025-05-27 Created: 2025-05-27 Last updated: 2025-05-28Bibliographically approved
Imtiaz, S., Popov, O. & i Riu, J. R. (2024). AI-based automatic detection of IP network performance in telecommunication. In: Sagaya Aurelia, Ossama Embarak (Ed.), Industry 4.0 Key Technological Advances and Design Principles in Engineering, Education, Business, and Social Applications: (pp. 189-220). CRC Press
Open this publication in new window or tab >>AI-based automatic detection of IP network performance in telecommunication
2024 (English)In: Industry 4.0 Key Technological Advances and Design Principles in Engineering, Education, Business, and Social Applications / [ed] Sagaya Aurelia, Ossama Embarak, CRC Press , 2024, p. 189-220Chapter in book (Refereed)
Abstract [en]

The convergence of complex networks, IoT, various services, the enormous amount of data over the network, and 5G have brought challenges to the telecom industry for enhanced service delivery and network maintenance and monitoring. With numerous Netrounds probes and test agents generating massive volumes of data, the knowledge produced is underutilized due to the manual search for insight within the data. With the help of Netrounds APIs and machine learning, the automation of Netrounds metrics data aimed to predict the network performance degradation and anomaly detection ahead of time. The automation was expected to provide meaningful data insight and minimize the violation of SLAs in terms of delay and packet loss. These are one of the primary objectives of business continuity management to handle threats and risks for various network and information systems. Automating Netrounds’ open and programable APIs through Python fed data to an automatic machine learning model (supervised learning for prediction and unsupervised learning for anomaly detection). The analytics were used to predict network behavior, anomaly detection, and maintenance of the SLA threshold.

Place, publisher, year, edition, pages
CRC Press, 2024
National Category
Computer Sciences
Identifiers
urn:nbn:se:su:diva-237994 (URN)10.1201/9781003343332-10 (DOI)2-s2.0-85200880096 (Scopus ID)9781003343332 (ISBN)
Available from: 2025-01-17 Created: 2025-01-17 Last updated: 2025-01-17Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2024). An Automated Adaptive Security Framework for Cyber-Physical Systems. In: Gabriele Lenzini, Paolo Mori, Steven Furnell (Ed.), The International Conference on Information Systems Security and Privacy (ICISSP 2024): . Paper presented at The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 26-28 February 2024, Rome, Italy. (pp. 242-253). SciTePress
Open this publication in new window or tab >>An Automated Adaptive Security Framework for Cyber-Physical Systems
2024 (English)In: The International Conference on Information Systems Security and Privacy (ICISSP 2024) / [ed] Gabriele Lenzini, Paolo Mori, Steven Furnell, SciTePress , 2024, p. 242-253Conference paper, Published paper (Refereed)
Abstract [en]

The paper promotes the notion that any security solution for cyber-physical systems (CPS) should be adaptive and based on the type of attacks and their frequency. Namely, the solution should monitor its environment continuously to defend itself from a cyber-attack by modifying its defensive mechanism. Moreover, the research provides analyses of situations where the environment changes dynamically over time, requiring the designated adaptation to contemplate and respond adequately to these changes. In particular, it explores applying adaptive model predictive control concepts derived from control theory to develop specific adaptive security solutions. These systems can make decisions by forecasting their future performance for various modes or options of adaptation. Using quantitative information, the software then selects the adaptations that minimise the cost associated with security failures. This is highly significant considering that CPS are engineered systems built from and depend upon the seamless integration of computational algorithms and physical components. Moreover, security breaches are rising, and CPS are challenged by catastrophic damage, resulting in billions of losses making many of today’s solutions obsolete. While security agents issue new sets of vulnerability indicators and patches to address security breaches, these changes are continuous processes ad infinitum. A case study on a medical emergency response system illustrates the essential and salient futures of the proposed adaptive security framework for CPS.

Place, publisher, year, edition, pages
SciTePress, 2024
Series
Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), E-ISSN 2184-4356
Keywords
Security Engineering, Control Theory, Adaptive Systems, Security Solution, Multiple Failure, Cyber-Physical Systems
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-237088 (URN)10.5220/0012469100003648 (DOI)2-s2.0-85190838421 (Scopus ID)978-989-758-683-5 (ISBN)
Conference
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 26-28 February 2024, Rome, Italy.
Available from: 2024-12-10 Created: 2024-12-10 Last updated: 2025-08-22Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2024). Evaluation of Asfalia, a Security Attack Event Monitoring Framework. Paper presented at International conference on industry sciences and computer science innovation. Procedia Computer Science, 237, 793-802
Open this publication in new window or tab >>Evaluation of Asfalia, a Security Attack Event Monitoring Framework
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 237, p. 793-802Article in journal (Refereed) Published
Abstract [en]

Cyber security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in losses of billions of dollars per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are cyber-physical - a mix of people, processes, technology, and infrastructure. However, existing security solutions for cyber-physical systems are likely to become obsolete; even though security agents issue new sets of vulnerability indicators and patches to address security breaches, these vulnerability indicators change over time, which is a never-ending process. To tackle this problem, a multi-realm security attack event monitoring framework was proposed to monitor, model, and analyse security events in social(business process), cyber, and physical infrastructure components of cyber-physical systems. In this paper, we evaluate this security attack event monitoring framework. The evaluation was performed by using a large-scale case study on a medical emergency response system.

 

Place, publisher, year, edition, pages
Elsevier B.V., 2024
Keywords
attack pattern, cyber physical-systems, cyber security, Domain Assumption, industrial Internet of Things, runtime model
National Category
Computer Systems
Identifiers
urn:nbn:se:su:diva-236089 (URN)10.1016/j.procs.2024.05.167 (DOI)2-s2.0-85195398483 (Scopus ID)
Conference
International conference on industry sciences and computer science innovation
Available from: 2024-11-28 Created: 2024-11-28 Last updated: 2025-08-22Bibliographically approved
Seid, E., Satheesh, S., Popov, O. & Blix, F. (2024). FAIR: Cyber Security Risk Quantification In Logistics Sector. Procedia Computer Science, 237, 783-792
Open this publication in new window or tab >>FAIR: Cyber Security Risk Quantification In Logistics Sector
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 237, p. 783-792Article in journal (Refereed) Published
Abstract [en]

For many industries, the fourth industrial revolution has brought technological advancements in the form of advances in the integration of physical and digital technologies, particularly for cyber-physical systems, that go far beyond speed, scalability, storage, and cost-effectiveness. Smart manufacturing, smart factories, smart warehousing, and smart logistics are every aspect of the enabling Fourth Industrial Revolution. As a result of these improvements and advantages, new attack surfaces have been created that benefit malicious actors. For effective cyber security risk management in the face of converging cyber attacks, it is essential to quantify cyber risks across or within organisations that estimate cyber security risks in monetary value. This study explored and integrated the FAIR methodology(a well-recognized approach for quantitative cyber security risk assessment) to quantify cyber risk. A case study was conducted with one of the largest logistics companies in Scandinavia.

Keywords
Cyber Physical-Systems, Cybersecurity, FAIR Methodology, Logistics and Supply Chain, Quantifying Cyber Risk
National Category
Production Engineering, Human Work Science and Ergonomics
Identifiers
urn:nbn:se:su:diva-236095 (URN)10.1016/j.procs.2024.05.166 (DOI)2-s2.0-85195363970 (Scopus ID)
Available from: 2024-12-02 Created: 2024-12-02 Last updated: 2024-12-02Bibliographically approved
Wilson, T. J., Bergman, J., Jackson, A. & Popov, O. B. (2024). Preventing Machines From Lying: Why Interdisciplinary Collaboration is Essential for Understanding Artefactual or Artefactually Dependent Expert Evidence. Journal of Criminal Law, 88(2), 105-129
Open this publication in new window or tab >>Preventing Machines From Lying: Why Interdisciplinary Collaboration is Essential for Understanding Artefactual or Artefactually Dependent Expert Evidence
2024 (English)In: Journal of Criminal Law, ISSN 0022-0183, Vol. 88, no 2, p. 105-129Article in journal (Refereed) Published
Abstract [en]

This article demonstrates a significantly different approach to managing probative risks arising from the complex and fast changing relationship between law and computer science. Law's historical problem in adapting to scientific and technologically dependent evidence production is seen less as a socio-techno issue than an ethical failure within criminal justice. This often arises because of an acceptance of epistemological incomprehension between lawyers and scientists. Something compounded by the political economy of criminal justice and safeguard evasion within state institutions. What is required is an exceptionally broad interdisciplinary collaboration to enable criminal justice decision-makers to understand and manage the risk of further ethical failure. If academic studies of law and technology are to address practitioner concerns, it is often necessary, however, to step down the doctrinal analysis to a specific jurisdictional level.

Keywords
Explaining/understating AI/ML-assisted decisions, interdisciplinary methodology in law and technology studies, neoliberalism, ethics and criminal justice systems
National Category
Peace and Conflict Studies Other Social Sciences not elsewhere specified Other Legal Research Criminology
Identifiers
urn:nbn:se:su:diva-226528 (URN)10.1177/00220183231226087 (DOI)001147232400001 ()2-s2.0-85183011804 (Scopus ID)
Available from: 2024-02-14 Created: 2024-02-14 Last updated: 2025-02-24Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6176-6817

Search in DiVA

Show all publications