Per M. Gustavsson

Per M. Gustavsson
George Mason University | GMU · Center of Excellence in Command, Control, Communications, Computing and Intelligence

PhD

About

78
Publications
43,351
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
500
Citations
Introduction
Per M. Gustavsson currently works at Intraservice Göteborgs Stad in Sweden and are Affiliated Research Faculty at the Center of Excellence in Command, Control, Communications, Computing Intelligence and Cyber (C4I & Cyber Center) , George Mason University; Adjunct Senior Lecturer (GB) / Adjunct Associate Professor (US) Informatics at University of Skövde;. Per does research in Cyber Security, Command and Control (C2), Control Systems Engineering and Combat Engineering.
Additional affiliations
December 2019 - present
Intraservcie Göteborgs Stad
Position
  • Chief Information Security Officer (CISO)
Description
  • The Chief Information Security and Privacy Security Officer (CISO) is the one who leads, controls, secures and coordinates all information security and data protection work at Intraservice. The purpose Is to reduce Information security risks, data protection risks, IT security riska and physical security risks in relation to the risk tolerance and governing documents for Intraservice. The CISO function leads, controls, secures and coordinates all aspects of Information Security and Privacy for
August 2019 - December 2020
Intraservice Götebogs Stad
Position
  • IT Secutiry Architect
Description
  • - Own and manage the general requirements for the IT and information security area. - Interpret requirements and define reference solutions to minimize diversity in solutions. - Participate as an expert resource in projects to help the projects make realistic, relevant and regulatory correct decisions
August 2017 - August 2019
Atea AB
Position
  • Consultant
Description
  • Senior Advisor Information and Cyber Security (50%) - GDPR - Cyber Awareness - Risk and Vulnerability Assesment - ISMS (Information Security Management Systems) - ISO 27001 - ... Business Developer (50%) - Building a team of Information and Cyber Security professionals - Developing Services - Collaboration with Universities

Publications

Publications (78)
Conference Paper
Full-text available
A network-centric approach enables systems to be interconnected in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments require commanders to plan for more flexible missions that allow organizations from various nations and agencies to join or separate from the teams performi...
Conference Paper
Full-text available
Serious gaming is the collective name for the utilization of games and tools for education purposes. The utilization allows the organizations to train more effectively in various simulations and simulators. The simulations can be conducted in a high detail rich environment, without having to physically perform the exercise or simulation, for a lowe...
Conference Paper
Full-text available
Detecting and defending against Multi-Stage Advanced Persistent Threats (APT) Attacks is a challenge for mechanisms that are static in its nature and are based on blacklisting and malware signature techniques. Blacklists and malware signatures are designed to detect known attacks. But multi-stage attacks are dynamic, conducted in parallel and use s...
Conference Paper
Full-text available
In Security Operations Center there is a need to perceive, comprehend and project cyber activities. Therefore it requires developing Cyber Situational Awareness (CSA) capability that involves perception of different security events, comprehension of the meaning of the current cyber security situation in the organization, and the projection of futur...
Conference Paper
Full-text available
The Network-Centric approach envisioned in the Global Information Grid enables the interconnection of systems in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments require commanders to plan for missions that allow organizations from various nations and agencies to join or...
Chapter
A literature study has identified the major impacts of important design choices in simulation models and simulation-games that model critical infrastructure resilience. The four major groups of design choices discussed in this article are: (1) the chosen learning goal (system understanding or collaboration training), (2) realism and time scale of t...
Conference Paper
Full-text available
Critical infrastructures (CIs) are becoming increasingly sophisticated with embedded cyber-physical systems (CPSs) that provide managerial automation and autonomic controls. Yet these advances expose CI components to new cyber-threats, leading to a chain of dys-functionalities with catastrophic socio-economical implications. We propose a comprehens...
Conference Paper
Full-text available
Critical infrastructures become more and more entangled and rely extensively on information technology. Adeeper insight into the relationships between critical infrastructures enables the actors involved to more quicklyunderstand the severity of information technology disruptions and to identify robust cross-functional mitigatingactions. This study...
Conference Paper
Full-text available
Military forces operate in complex and dynamic environments [1] where bad decisions might have fatal consequences. A key ability of the commander, team and individual warfighter is to quickly adapt to novel situations. Live, Virtual and Constructive training environments all provide elements of best practices for this type of training. However, man...
Conference Paper
Full-text available
Cybersecurity success is essentially the result of an effective risk management process. However, this process is being challenged by the inherent complexity of systems, developed with vulnerable components and protocols, and the crescent sophistication of attackers, now backed by well-resourced criminal organizations and nations. With this scenari...
Chapter
Full-text available
The chapter presents reflections on the management of multimedia production for mobile learning. The theoretical discussion addresses the development of multimedia for distance learning and considers both technical and pedagogical issues. The management of educational projects is considered as well and focuses on international standards. In this ch...
Conference Paper
Full-text available
http://informs-sim.org/wsc14papers/includes/files/393.pdf
Conference Paper
Full-text available
Spatial hashing is an efficient technique to speed up proximity queries on moving objects in the space domain, suitable for computer entertainment applications and simulations. This paper presents an efficient three-step algorithm for building a 1D hash table for spatial hashing needed to perform fast queries on objects for location and proximity d...
Conference Paper
Full-text available
In order to deal with shortcomings of security management systems [1][2], this work proposes a methodology based on agents paradigm [3] for cybersecurity risk management. In this approach a system is decomposed in agents that may be used to attain goals established by attackers. Threats to business are achieved by attacker's goals in service and de...
Conference Paper
Full-text available
A trend over the past years is that simulation systems for training are being connected in simulation networks, allowing the interaction of teams spread in distributed sites. By combining interconnected simulation systems the simulation complexity increases and may affect time-critical simulation tasks in a negative way. As a consequence, the train...
Conference Paper
Full-text available
In most contexts, the word cyber tends to refer to the set of technologies associated with computers and communication infrastructures like the Internet. This word seems to be new and very modern to the average user of computers but it was extracted from cybernetics, which was originally coined in 1948 by U.S. mathematician Norbert Wiener. Cyber se...
Conference Paper
Full-text available
This paper discusses a framework that uses computational simulation to improve the performance of unmanned aerial vehicles through the creation and the selection of better navigation rules. For such task, the approaches known as Participatory Learning System and as Genetic Algorithm will be combined. The intent is to provide the mathematical and co...
Conference Paper
Full-text available
In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the...
Conference Paper
Full-text available
Building comprehensive cyber security strategies to protect people, infrastructure and assets demands research on methods and practices to reduce risks. Once the methods and practices are identified, there is a need to develop training for the many stakeholders involved, from security experts to the end user. In this paper, we discuss new approache...
Conference Paper
Full-text available
Cyber refers to the set of technologies associated with computers and communication infrastructures like the Internet. Cyber Crisis Management refers to the administration of different situations involving computers in a threat landscape that continues to evolve. This paper presents a new approach to training that considers this dynamic.
Conference Paper
Full-text available
The conference theme, M&S Support to Transitioning Forces, speaks to the need to grow better capabilities for the future while sustaining the lessons learned from past deployments. One such better capability now growing under the auspices of the NMSG is MSG-085 "Standardization for C2-Simulation Interoperation" which is leading the way to new capab...
Conference Paper
Full-text available
Military training involves activities that range from combat operations to strategic decisions on how to locate and transport personal and supplies, such as food, ammunition, fuel and medical equipment. Despite of the fact that most military training is difficult to acquire from real situations, the skills required for learning from combat training...
Conference Paper
Full-text available
The Instruction Centre for Operations on Law and Order Assurance (CIOpGLO) is a Brazilian Army facility created in March 2005 in Campinas, Brazil. The mission of this centre involves the offering of training in different perspectives, which includes the preparation of soldiers to enter in slums areas in Rio de Janeiro and other cities to arrest cri...
Conference Paper
Full-text available
This paper presents an application in Information Fusion related to Analytics and fusion of Big Data. The approach involves the analysis of specific aspects of the management of a Brazilian university and the proposition of a new framework that may be useful mainly for universities focused on improving their strategic planning while having excellen...
Conference Paper
Full-text available
In universities, before the beginning of each school year, it is held the distribution of classes among the available teachers. For such task, different constraints must be fulfilled like preventing a teacher to teach in two different places at the same time and avoid solutions in which some teachers have more class hours than others. This process,...
Conference Paper
Full-text available
a) Universidade Estadual de Campinas – UNICAMP, Brazil (b) Universidade Estadual Paulista – UNESP, Brazil (c) Högskolan i Skövde – HiS, Sweden (d) Saab Group, Sweden ABSTRACT With the increasing complexity of educational initiatives, several challenges arise as to appropriately allocate human and material resources or how to select alternative inve...
Conference Paper
Full-text available
The Coalition Battle Management Language (C-BML) as currently implemented requires that interoperating Command and Control (C2) and Simulation systems implement an interface to a Web service, using a clearly defined schema, to propagate Orders and Reports to participating systems. Continuing progress of C-BML, both in NATO MSG-085 and in the SISO s...
Conference Paper
Full-text available
There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems, processes and architectures should incorporate considerations related to both privacy and security. This incorporation may benefit from the offering of appropriate trai...
Conference Paper
Full-text available
Since 2003, a community focused on achieving interoperability among command and control (C2) systems and simulation systems has developed a new area of technology known as Battle Management Language (BML). Their vision is that a common basis for interoperation will lead to a future where military organizations can link their C2 and simulation syste...
Conference Paper
Full-text available
The Swedish Army has transformed from 31 brigades in to two in 20 years. At the same time the Swedish area of interest has increased from 60 km from the Swedish borders to 6000 km from Brussels. The type of missions for the armed forces has changed from invasion defending operations to international interoperable operations. This overall change als...
Conference Paper
Full-text available
Command and Control (C2) is viewed as an increasing important part of future military technologies. While recent C2 theory has focused on desirable features of complex organizations, such as Agility, and emerging work is looking at social media approaches – the key issues for many nations and programs are how to integrate and benefit from increased...
Conference Paper
Full-text available
The models related to security systems suggest solutions based on multidisciplinary teams with people from different areas working with the same goal. The preparation of such teams involves performing different types of training, including the use of simulations. In this perspective, this paper presents a proposal for continued research through int...
Conference Paper
Full-text available
This work considers training needs for cyber defence and discus the gamification of training. The use of game play mechanics will be considered with a special emphasis on strategies to encourage users to engage in desired secure behaviours. The use of games and game play mechanics has been shown to be able to make the training more engaging. Seriou...
Conference Paper
Full-text available
A Battle Management Language (BML) is a general term for a collection of approaches to develop a structured machine and human interpretable representation of Command and Control and Simulation data for C4I systems, simulation systems, and robotic forces with the purpose to make it possible to communicate unambiguously with any of these other types...
Thesis
Full-text available
Intent is a fundamental element in military Command and Control (C2) systems. The ability for a commander to communicate Intent is vital to lead subordinates so that the overall mission is completed in the best possible way. However, the expressiveness of Intent is limited in current C2 systems. The current data exchange models used is not capable...
Chapter
Full-text available
This Chapter will describe how the ideas developed by (STAFYLOPATIS, 1998) could be employed to study the integration of the GAs and RL to produce rules for automatic guided vehicles searching for a better performance. The main contributions of this Chapter are: the vehicle, its sensors, and also the environment for training are different from the...
Conference Paper
Full-text available
Since its inception in military systems two decades ago, distribution simulation has grown to provide a rich and varied family of technologies. During the same period, military requirements for distributed simulation have continued to evolve. The nature of warfighting today has shifted from focus on large, kinetic engagements to asymmetric warfare...
Article
Full-text available
Military missions in the 21st century are characterized by combinations of traditional symmetric conventional warfare, irregular warfare, and operations other than war.The inherent uncertainty in an actual mission and the variety of potential organizations (e.g. multi-agency, non-governmental, private volunteer, international, international corpora...
Conference Paper
Full-text available
In the western military doctrine the principles of Commander's Intent (CSI) and Command Intent (CI) is essential concepts that need to be communicated, exchanged and shared to facilitate information, knowledge, decision and effects superiority. To achieve better decisions and improve tempo, the western military forces has adopted to the NATO Networ...
Conference Paper
Full-text available
Today's military missions are increasingly complex. The landscape is ever-changing; the mission space can literally be anywhere and have any shape; the opponents' adaption cycles are often quicker than ours; unforeseen events is caused by Nature itself; the opposing human or nature is not limited by national borders or organizational jurisdictions;...
Conference Paper
Full-text available
Live, Virtual and Constructive Training and Experimentation Networks has been identified as an enabler to efficiently connect existing and future training systems across traditional system boundaries and even across organizational boundaries. But the vast majority of current training system is built to support only a specific domain or specific tra...
Conference Paper
Full-text available
The Allied Command Transformation (ACT) has initiated the NATO Snow Leopard program with the vision "to deliver to NATO and partners a persistent, distributed and joint training capability able to support training from operational to tactical level across the full spectrum of operations, while leveraging existing national expertise and capabilities...
Conference Paper
Full-text available
To plan and develop scenarios for militarily simulation, there is a need for support tools that can describe initial states and dynamic information such as orders. In collaborative simulations there is also a need to be able to exchange scenarios, and parts of scenarios, amongst the participating simulation and operational systems, for both machine...
Conference Paper
Full-text available
The maritime industry is experiencing one of its longest and fastest periods of growth. Hence, the global maritime surveillance capacity is in a great need of growth as well. The detection of vessel activity is an important objective of the civil security domain. Detecting vessel activity may become problematic if audit data is uncertain. This pape...
Conference Paper
Full-text available
The goal of the Core Technical Framework study is to define a framework that promotes secure, multinational distributed simulation. The main domains targeted are Training, Simulation Based Acquisition (SBA), Concept Development and Experimentation (CD&E). The framework benefits from, and can be easily integrated with, Enterprise Architecture Framew...
Conference Paper
Full-text available
The change in the use of military from traditional missions to peace-keeping and restoring societies, changes the way that doctrine, methods and procedures are developed and employed. Today a 21st century military mission involves participants from numerous countries spanning a variety of organizations (military, civil, public, governmental, NGO, p...
Conference Paper
Full-text available
The aim of maritime surveillance systems is to detect threats early enough to take appropriate actions. We present the results of a study on maritime domain awareness performed during the fall of 2008. We analyze an identified capability gap of worldwide surveillance in the maritime domain, and report from a user workshop addressing the identified...
Conference Paper
Full-text available
The Network-centric vision enables systems to be interconnected to support multi-lateral, civilian and military missions. The constantly changing environment requires the commanders to plan for missions that allow for units from various nations, agencies etc. to join or separate from the team, depending on the situation, as the mission unfolds. The...
Conference Paper
Full-text available
The global maritime supply chain is essential to international trade and managing threats in the maritime domain is critical to national and international security, State of the art MDA requires the right information in the hands of the right stakeholders at the right time. Such Mission Common Operational Picture require that Public Private Partner...
Conference Paper
Full-text available
The change in the use of military from traditional missions to peace-keeping and restoring societies, changes the way doctrine, methods and procedures are developed and employed. The shift in military doctrine towards subordinates initiative and self-synchronization amongst participating teams, originating from military, civil, public and private o...
Conference Paper
Full-text available
The Coalition Battle Management Language (C-BML) is a common language for expressing and exchanging plans, orders, and reports across command and control systems, modeling and simulation systems, and robotic systems. In March 2006, the Simulation Interoperability Standards Organization (SISO) approved initiation of a Product Development Group (PDG)...
Conference Paper
Full-text available
Agile Computer Generated Forces (CGF) for the Next Generation Training Systems and Planning Systems need to have a more agile and flexible behavior than the current commonly used CGF systems can deliver. This because of that the human behavior in a real crisis or military operation is adaptive. This paper describes one approach to enable such funct...
Conference Paper
Full-text available
The Coalition Battle Management Language (C-BML) is an emerging standard for expressing and exchanging plans, orders, and reports across command and control (C2) systems, modeling and simulation (M&S) systems, and robotic systems. In March 2006, the Simulation Interoperability Standards Organization (SISO) approved initiation of a Product Developme...
Conference Paper
Full-text available
The use of technology to assist human decision making has been around for quite some time now. In the literature, models of both technological and human aspects of this support can be identified. However, we argue that there is a need for a unified model which synthesizes and extends existing models. In this paper, we give two perspectives on situa...
Conference Paper
Full-text available
The Net Centric and Global Information Grid (GIG) visions envision systems that will be interconnected to support multi-lateral, civilian and military missions. The constantly changing environment requires commanders and leaders to plan for missions that allow for units from various nations, agencies, etc. to join or separate from the team, dependi...
Conference Paper
Full-text available
Within the European Commission sixth framework programme (FP6), the project Open Advanced System for CrisIS Management (OASIS) is striving to define and develop a first version of an open, flexible and generic Information and Communication Technologies (ICT) Crisis Management System. This Command and Control system aims to support civil protection...
Conference Paper
Full-text available
Within the European Commission sixth framework programme (FP6), the project Open Advanced System for CrisIS Management (OASIS) is striving to define and develop a first version of an open, flexible and generic Information and Communication Technologies (ICT) Crisis Management System. This Command and Control system aims to support civil protection...
Conference Paper
Full-text available
The Net Centric and Global Information Grid (GIG) visions envision systems that will be interconnected to support multi-lateral, civilian and military missions. The constantly changing environment requires commanders and leaders to plan for missions that allow for units from various nations, agencies, etc. to join or separate from the team, dependi...
Conference Paper
Full-text available
The Net-centricity and Global Information Grid (GIG) visions enable systems to be interconnected to support multi-lateral, civilian and military missions. The constantly changing environment requires the commanders to plan for missions that allow for units from various nations, agencies etc. to join or separate from the team, depending on the situa...
Conference Paper
Full-text available
Serious Gaming is traditionally a scientific domain where civil technology and methods are used to create training and education for serious purposes. In this paper another approach towards these methods and technologies are presented. When looking at the vast amount of people playing “Battlefield 2” (BF2), versus the number of users of military co...