Stephen Dirk Bjørn Wolthusen
Stephen Dirk Bjørn Wolthusen
Professor
Department of Information Security and Communication TechnologyBackground and activities
Courses
- IMT4125 - Network Security
- IMT4203 - Critical Infrastructure Security
- IMT6011 - Introduction to Information Security
- IIKG6502 - Kritisk infrastruktur - sikkerhet
- IMT6003 - IIK Summer School
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
Journal publications
- (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection. vol. 35.
- (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems. vol. 254.
- (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA). vol. 12 (3).
- (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA). vol. 11 (2).
- (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik.
- (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON.
- (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA). vol. 11 (2).
- (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA). vol. 11 (11).
- (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA). vol. 11 (11).
- (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS). vol. 11260 LNCS.
- (2019) Threat Analysis for Smart Homes. Future Internet. vol. 11 (10).
- (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 12.
- (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS). vol. 10707 LNCS.
- (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting.
- (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS). vol. 10898 LNCS.
- (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology. vol. 542.
- (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid. vol. 8 (5).
- (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications. vol. 35.
- (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing. vol. 461.
- (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing. vol. 611.