Information Security Research Group
Research
The group is researching information security risk management, personal data management, and privacy leakage management. The main research areas include (but are not limited to) secure business process management, model-driven security, security risk management in blockchain applications, privacy management in intelligent transportation systems and blockchain-based applications, secure and private data analysis and visualisation for privacy and security by design systems.
PUBLICATIONS
2026
- Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, Vaclav Stupka, Lukas Malina, Raimundas Matulevičius: ForensicChain: Blockchain-based Secure Digital Forensic Investigations, be published at FSP 2025 proceedings.
- Antipenko, V., Matulevičius, R.: Operationalising Compliance in Manufacturin g:
Applying the FAST Method to NIS2 and the CRA, be published at PoEM 2025 Forum proceedings
- Raimundas Matulevičius, Liina Kamm, Mubashar Iqbal: Secure IT Systems, 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings, Conference proceedings, Feb 2026
2025
JOURNAL ARTICLES
- Ladjel Bellatreche, Marlon Dumas, Panagiotis Karras, Raimundas Matulevičius, Silvia Chiusano, Tania Cerquitelli, Robert Wrembel, Advances on data management systems, Information Systems, Volume 127, 2025, 102467, DOI: https://doi.org/10.1016/j.is.2024.102467
- A.-A. O. Affia-Jomants, R. Matulevičius, N. Pabat and L. Malina, "On Security Risk Management for Teleoperated Driving Systems," in IEEE Access, vol. 13, pp. 151153-151169, 2025, doi: 10.1109/ACCESS.2025.3602202.
- M. Iqbal, S. Suhail, R. Matulevičius, F. A. Shah, S. U. R. Malik, K. McLaughlin: IoV-TwinChain: Predictive maintenance of vehicles in internet of vehicles through digital twin and blockchain, Internet of Things, Volume 30, 2025, 101514, https://doi.org/10.1016/j.iot.2025.101514
- Seeba, M., Oja, T., Mäses, S., Murumaa, M. P., & Matulevičius, R. (2025). Toward NIS2 Compliance for Multiple Stakeholders with Security Level Evaluation Framework. Complex Systems Informatics and Modeling Quarterly, 45, 136-159. https://doi.org/10.7250/csimq.2025-45.07
- S. Suhail, M. Iqbal, K. McLaughlin, B. Lee, B. Imtiaz: A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber-Physical Systems, Internet of Things, 2025, 101547, https://doi.org/10.1016/j.iot.2025.101547
- Ladjel Bellatreche, Marlon Dumas, Panagiotis Karras, Raimundas Matulevičius, Silvia Chiusano, Tania Cerquitelli, Robert Wrembel, Advances on data management systems, Information Systems, Volume 127, 2025, 102467, DOI: https://doi.org/10.1016/j.is.2024.102467
CONFERENCES
- Abasi-amefon Obot Affia-Jomants, Alexander Serebrenik, James D. Herbsleb, and Alexander Nolte. 2025. In-person, Online and Back Again - A Tale of Three Hybrid Hackathons. Proc. ACM Hum.-Comput. Interact. 9, 7, Article CSCW432 (November 2025), 35 pages. https://doi.org/10.1145/3757613
- Antipenko, V. (2025). Security in Automated Manufacturing: A Function-Driven Approach. In: Pufahl, L., Rosenthal, K., Espańa, S., Nurcan, S. (eds) Intelligent Information Systems. CAiSE 2025. Lecture Notes in Business Information Processing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-031-94590-8_32
- Antipenko, V., Matulevičius, R. (2026). Function–Threat Alignment in CPS with FAST and MITRE ATT&CK. In: Deneckčre, R., Kirikova, M., Grabis, J. (eds) Perspectives in Business Informatics Research. BIR 2025. Lecture Notes in Business Information Processing, vol 562. Springer, Cham. https://doi.org/10.1007/978-3-032-04375-7_23
- Daubner, L., Harašta, J., Matulevičius, R. (2025). Forensic Readiness and Privacy: Towards Resolving Software Goal Conflict. In: Guizzardi, R., Pufahl, L., Sturm, A., van der Aa, H. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2025 2025. Lecture Notes in Business Information Processing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-031-95397-2_16
- Seeba, M., Valgre, M., Matulevičius, R. (2025). Evaluating Organization Security: User Stories of European Union NIS2 Directive. In: Krogstie, J., Rinderle-Ma, S., Kappel, G., Proper, H.A. (eds) Advanced Information Systems Engineering. CAiSE 2025. Lecture Notes in Computer Science, vol 15701. Springer, Cham. https://doi.org/10.1007/978-3-031-94569-4_4
- Suhail, S., Iqbal, M., McLaughlin, K., Lee, B., Imtiaz, B. (2025). A Framework for Applying Digital Twins to Support Incident Response. In: Garcia-Alfaro, J., et al. Computer Security. ESORICS 2024 International Workshops. ESORICS 2024. Lecture Notes in Computer Science, vol 15263. Springer, Cham. https://doi.org/10.1007/978-3-031-82349-7_30
Other publications (...-2024)