Follow
Elena Lisova
Title
Cited by
Cited by
Year
Safety and security co-analyses: A systematic literature review
E Lisova, I Šljivo, A Čaušević
IEEE Systems Journal 13 (3), 2189-2200, 2018
842018
Next generation real-time networks based on IT technologies
W Steiner, PG Peón, M Gutiérrez, A Mehmed, G Rodriguez-Navas, ...
2016 IEEE 21st International Conference on Emerging Technologies and Factory …, 2016
442016
Protecting clock synchronization: Adversary detection through network monitoring
E Lisova, M Gutiérrez, W Steiner, E Uhlemann, J Åkerberg, R Dobrin, ...
Journal of Electrical and Computer Engineering 2016, 2016
282016
A perspective on ensuring predictability in time-critical and secure cooperative cyber physical systems
S Mubeen, E Lisova, AV Feljan
20th IEEE International Conference on Industrial Technology ICIT 13, 2019
122019
A Fault-Tolerant Controller Manager for Platooning Simulation
S Hasan, MA Al Ahad, I Sljivo, A Balador, S Girs, E Lisova
2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE), 1-6, 2019
112019
Monitoring of clock synchronization in cyber-physical systems: A sensitivity analysis
E Lisova, E Uhlemann, J Åkerberg, M Björkman
2017 International Conference on Internet of Things, Embedded Systems and …, 2017
112017
Risk evaluation of an ARP poisoning attack on clock synchronization for industrial applications
E Lisova, E Uhlemann, W Steiner, J Åkerberg, M Björkman
2016 IEEE International Conference on Industrial Technology (ICIT), 872-878, 2016
112016
Game theory applied to secure clock synchronization with IEEE 1588
E Lisova, E Uhlemann, W Steiner, J Åkerberg, M Björkman
2016 IEEE International Symposium on Precision Clock Synchronization for …, 2016
102016
Towards secure wireless TTEthernet for industrial process automation applications
E Lisova, E Uhlemann, J Åkerberg, M Björkman
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation …, 2014
102014
Delay attack versus clock synchronization—A time chase
E Lisova, E Uhlemann, J Åkerberg, M Björkman
2017 IEEE International Conference on Industrial Technology (ICIT), 1136-1141, 2017
92017
Monitoring for Securing Clock Synchronization
E Lisova
Mälardalen University, 2018
82018
Agent-centred approach for assuring ethics in dependable service systems
I Šljivo, E Lisova, S Afshar
2017 IEEE World Congress on Services (SERVICES), 51-58, 2017
72017
Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems
J El Hachem, A Sedaghatbaf, E Lisova, A Causevic
2019 26th Asia-Pacific Software Engineering Conference (APSEC), 363-370, 2019
62019
In Sync with Today's Industrial System Clocks
RN Gore, E Lisova, J Åkerberg, M Björkman
2020 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2020
52020
Investigating attack propagation in a sos via a service decomposition
E Lisova, J El Hachem, A Causevic
2019 IEEE World Congress on Services (SERVICES) 2642, 9-14, 2019
52019
Incorporating attacks modeling into safety process
A Šurković, D Hanić, E Lisova, A Čaušević, K Lundqvist, D Wenslandt, ...
International Conference on Computer Safety, Reliability, and Security, 31-41, 2018
42018
A survey of security frameworks suitable for distributed control systems
E Lisova, E Uhlemann, W Steiner, J Åkerberg, M Björkman
2015 International Conference on Computing and Network Communications …, 2015
42015
Towards attack models in autonomous systems of systems
A Šurković, D Hanić, E Lisova, A Čaušević, D Wenslandt, C Falk
2018 13th Annual Conference on System of Systems Engineering (SoSE), 583-585, 2018
32018
Clock synchronization considerations in security informed safety assurance of autonomous systems of systems
E Lisova, A Čaušević, E Uhlemann, M Björkman
IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society …, 2017
32017
A systematic way to incorporate security in safety analysis
E Lisova, A Cauševic, K Hänninen, H Thane, H Hansson
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20