Publications by Engla Rencelj Ling
Peer reviewed
Articles
[1]
S. Katsikeas et al., "Empirical evaluation of a threat modeling language as a cybersecurity assessment tool," Computers & security (Print), vol. 140, 2024.
[2]
E. Ling and M. Ekstedt, "A threat modeling language for generating attack graphs of substation automation systems," International Journal of Critical Infrastructure Protection, pp. 100601-100601, 2023.
[3]
E. Rencelj Ling and M. Ekstedt, "Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data," SN Computer Science, vol. 4, no. 3, 2023.
[4]
S. Hacks et al., "powerLang : a probabilistic attack simulation language for the power domain," Energy Informatics, vol. 3, no. 1, 2020.
Conference papers
[5]
E. Rencelj Ling and M. Ekstedt, "Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities," in Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 2022, pp. 96-107.
[6]
E. Rencelj Ling et al., "Securing Communication and Identifying Threats in RTUs : A Vulnerability Analysis," in ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022.
[7]
S. Hacks et al., "Towards a Systematic Method for Developing Meta Attack Language Instances," in Enterprise, Business-Process and Information Systems Modeling 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6–7, 2022, Proceedings, 2022, pp. 139-154.
[8]
E. Rencelj Ling and M. Ekstedt, "Generating Threat Models and Attack Graphs based on the IEC 61850 System Configuration description Language," in Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2021.
[9]
E. Ling, R. Lagerström and M. Ekstedt, "A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain," in Critical Information Infrastructures Security, CRITIS. 15th International Conference, CRITIS 2020, Bristol, UK, September 2–3, 2020, Proceedings, 2020, pp. 47-58.
[10]
X. Mao et al., "Conceptual Abstraction of Attack Graphs : a Use Case of securiCAD," in Graphical Models for Security. GraMSec 2019., 2019, pp. 186-202.
Latest sync with DiVA:
2024-11-17 00:40:50