Change search
Link to record
Permanent link

Direct link
BETA
Carlsson, Anders
Publications (10 of 16) Show all publications
Carlsson, A., Kuzminykh, I. & Gustavsson, R. (2019). Virtual Security Labs Supporting Distance Education in ReSeLa Framework. In: Auer M.E.,Tsiatsos T. (Ed.), Advances in Intelligent Systems and Computing: . Paper presented at 21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September (pp. 577-587). Springer Verlag, 917
Open this publication in new window or tab >>Virtual Security Labs Supporting Distance Education in ReSeLa Framework
2019 (English)In: Advances in Intelligent Systems and Computing / [ed] Auer M.E.,Tsiatsos T., Springer Verlag , 2019, Vol. 917, p. 577-587Conference paper, Published paper (Refereed)
Abstract [en]

To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested. © 2019, Springer Nature Switzerland AG.

Place, publisher, year, edition, pages
Springer Verlag, 2019
Series
Advances in Intelligent Systems and Computing, ISSN 2194-5357 ; 917
Keywords
CDIO, Cyber security, Distance learning, OpenStack, Remote lab, Training lab, Virtualization, Computer programming, Computer science, Distance education, Cloud-based, High demand, Learning support, Remote-labs, Virtual security, E-learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-17781 (URN)10.1007/978-3-030-11935-5_55 (DOI)2-s2.0-85063026787 (Scopus ID)9783030119348 (ISBN)
Conference
21st International Conference on Interactive Collaborative Learning, ICL 2018; Kos Island; Greece; 25 September 2018 through 28 September
Available from: 2019-04-05 Created: 2019-04-05 Last updated: 2019-04-05Bibliographically approved
Kuzminykh, I. & Carlsson, A. (2018). Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) (Ed.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118: . Paper presented at NEW2AN 2018/ruSMART 2018, St. Petersburg (pp. 52-63). Springer, 11118
Open this publication in new window or tab >>Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
2018 (English)In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118 / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds), Springer, 2018, Vol. 11118, p. 52-63Conference paper, Published paper (Refereed)
Abstract [en]

This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11118
Keywords
IoT, Avatar, Thing instance, Threat assessment, Security risk assessment
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17128 (URN)10.1007/978-3-030-01168-0_6 (DOI)000477765900006 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
NEW2AN 2018/ruSMART 2018, St. Petersburg
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Kuzminykh, I., Carlsson, A., Franksson, R. & Liljegren, A. (2018). Measuring a LoRa Network: Performance, Possibilities and Limitations. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): . Paper presented at 18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018 (pp. 116-128). Springer, 11118
Open this publication in new window or tab >>Measuring a LoRa Network: Performance, Possibilities and Limitations
2018 (English)In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y., Springer, 2018, Vol. 11118, p. 116-128Conference paper, Published paper (Refereed)
Abstract [en]

Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.

Place, publisher, year, edition, pages
Springer, 2018
Series
Lecture Notes in Computer Science ; 11118
Keywords
IoT, LoRa, LPWAN, Transmission range, Arduino, Raspberry Pi
National Category
Engineering and Technology
Identifiers
urn:nbn:se:bth-17129 (URN)10.1007/978-3-030-01168-0_11 (DOI)000477765900011 ()978-3-030-01167-3 (ISBN)978-3-030-01168-0 (ISBN)
Conference
18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018; St. Petersburg; Russian Federation; 27 August 2018 through 29 August 2018
Available from: 2018-10-15 Created: 2018-10-15 Last updated: 2019-09-10Bibliographically approved
Yevdokymenko, M., Shapovalova, A., Voloshchuk, O. & Carlsson, A. (2018). Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment. In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T). Paper presented at 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, Kharkiv,OCT 09-12 (pp. 609-612). IEEE, Article ID 8632079.
Open this publication in new window or tab >>Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment
2018 (English)In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), IEEE , 2018, p. 609-612, article id 8632079Conference paper, Published paper (Refereed)
Abstract [en]

The paper explores methods for assessing vulnerabilities and assessing the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the presence of vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
infocommunication network, vulnerability, security, defense analysis, weight
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-17717 (URN)000458659100115 ()
Conference
2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, Kharkiv,OCT 09-12
Available from: 2019-03-08 Created: 2019-03-08 Last updated: 2019-04-04Bibliographically approved
Carlsson, A. & Gustavsson, R. (2018). The art of war in the cyber world. In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings: . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine (pp. 42-44). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>The art of war in the cyber world
2018 (English)In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 42-44Conference paper, Published paper (Refereed)
Abstract [en]

The paper focus on cyber weapons used in Advanced Persistent Threat (ATP) attacks in present and future cyber warfare. The combined use of propaganda and cyber warfare supports military operations on the ground and is exemplified with the ongoing Russian hybrid warfare in Ukraine. New models and methods to develop future trustworthy critical infrastructures in our societies are presented. Some mitigation ideas to meet the challenges of future hybrid warfare are also discussed. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
ATP attack vectors, critical infrastruct-ures, espionage, false information, Network Function Virtualization (NFV), Software Defined Networks (SDN), Computer crime, Military operations, Art of war, Attack vector, Cyber warfare, Cyber worlds, Ukraine, Network function virtualization
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-16169 (URN)10.1109/INFOCOMMST.2017.8246345 (DOI)2-s2.0-85046084448 (Scopus ID)9781538609835 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T, Kharkiv, Ukraine
Available from: 2018-05-11 Created: 2018-05-11 Last updated: 2018-05-14Bibliographically approved
Kuzminykh, I., Sokolov, V. & Carlsson, A. (2017). Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: IEEE (Ed.), 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T): . Paper presented at 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine (pp. 564-568). IEEE
Open this publication in new window or tab >>Scheme for dynamic channel allocation with interference reduction in wireless sensor network
2017 (English)In: 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) / [ed] IEEE, IEEE, 2017, p. 564-568Conference paper, Published paper (Refereed)
Abstract [en]

he paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.

Place, publisher, year, edition, pages
IEEE, 2017
Keywords
Transceivers, Channel allocation, Interference, Reflection, Antenna theory, Cognitive radio, Wireless fidelity
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-15950 (URN)10.1109/INFOCOMMST.2017.8246463 (DOI)000426514100127 ()978-1-5386-0983-5 (ISBN)
Conference
4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-05-11Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings: . Paper presented at 14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine (pp. 133-136). Institute of Electrical and Electronics Engineers (IEEE), Article ID 7916102.
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 133-136, article id 7916102Conference paper, Published paper (Refereed)
Abstract [en]

- In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
Computer aided design, Microelectronics, Wireless telecommunication, systemsZigbee
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-14675 (URN)10.1109/CADSM.2017.7916102 (DOI)000403602400032 ()9781509050444 (ISBN)
Conference
14th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017; Lviv - Polyana; Ukraine
Available from: 2017-06-22 Created: 2017-06-22 Last updated: 2017-09-21Bibliographically approved
Kuzminykh, I., Snihurov, A. & Carlsson, A. (2017). Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM): . Paper presented at 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Testing of communication range in ZigBee technology
2017 (English)In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper, Published paper (Refereed)
Abstract [en]

Abstract:In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2017
Keywords
ZigBee, Wireless sensor networks, Wireless communication, Universal Serial Bus, IoT, X-CTU, Communication system security
National Category
Communication Systems
Identifiers
urn:nbn:se:bth-15951 (URN)10.1109/CADSM.2017.7916102 (DOI)978-1-5090-5045-1 (ISBN)978-1-5090-5046-8 (ISBN)
Conference
14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Lviv, Ukraine
Available from: 2018-03-14 Created: 2018-03-14 Last updated: 2018-03-27Bibliographically approved
Adamov, A. & Carlsson, A. (2017). The state of ransomware: Trends and mitigation techniques. In: Proceedings of 2017 IEEE East-West Design and Test Symposium, EWDTS 2017: . Paper presented at 2017 IEEE East-West Design and Test Symposium, EWDTS, Novi Sad, Serbia. Institute of Electrical and Electronics Engineers Inc., Article ID 8110056.
Open this publication in new window or tab >>The state of ransomware: Trends and mitigation techniques
2017 (English)In: Proceedings of 2017 IEEE East-West Design and Test Symposium, EWDTS 2017, Institute of Electrical and Electronics Engineers Inc. , 2017, article id 8110056Conference paper, Published paper (Refereed)
Abstract [en]

This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms. Namely, VaultCrypt (CrypVault), TeslaCrypt, NanoLocker, Trojan-Ransom.Linux.Cryptor, Android Simplelocker, OSX/KeRanger-A, WannaCry, Petya, NotPetya, Cerber, Spora, Serpent ransomware were put under the microscope. A set of characteristics was proposed to be used for the analysis. The purpose of the analysis is generalization of the collected data that describes behavior and design trends of modern ransomware. The objective is to suggest ransomware threat mitigation techniques based on the obtained information. The novelty of the paper is the analysis methodology based on the chosen set of 13 key characteristics that helps to determine similarities and differences thorough the list of ransomware put under analysis. Most of the ransomware samples presented were manually analyzed by the authors eliminating contradictions in descriptions of ransomware behavior published by different malware research laboratories through verification of the payload of the latest versions of ransomware. © 2017 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2017
Series
East-West Design & Test Symposium, ISSN 2373-826X, E-ISSN 2472-761X
Keywords
Android (operating system), Computer operating systems, Research laboratories, Design trends, Key characteristics, Mitigation techniques, Threat mitigation, Trojans, Malware
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-15854 (URN)10.1109/EWDTS.2017.8110056 (DOI)000426878200029 ()2-s2.0-85040515914 (Scopus ID)9781538632994 (ISBN)
Conference
2017 IEEE East-West Design and Test Symposium, EWDTS, Novi Sad, Serbia
Available from: 2018-02-02 Created: 2018-02-02 Last updated: 2018-04-04Bibliographically approved
Adamov, A. & Carlsson, A. (2016). Cloud incident response model. In: Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016: . Paper presented at 2016 IEEE East-West Design and Test Symposium, (EWDTS), Yerevan, Armenia. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Cloud incident response model
2016 (English)In: Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper, Published paper (Refereed)
Abstract [en]

This paper addresses the problem of incident response in clouds. A conventional incident response model is formulated to be used as a basement for the cloud incident response model. Minimization of incident handling time is considered as a key criterion of the proposed cloud incident response model that can be done at the expense of embedding infrastructure redundancy into the cloud infrastructure represented by Network and Security Controllers and introducing Security Domain for threat analysis and cloud forensics. These architectural changes are discussed and applied within the cloud incident response model. © 2016 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2016
Keywords
Architectural changes, Cloud forensics, Cloud infrastructures, Handling time, Incident response, Security domains, Threat analysis
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-14067 (URN)10.1109/EWDTS.2016.7807665 (DOI)000400700700044 ()2-s2.0-85015244995 (Scopus ID)9781509006939 (ISBN)
Conference
2016 IEEE East-West Design and Test Symposium, (EWDTS), Yerevan, Armenia
Available from: 2017-03-30 Created: 2017-03-30 Last updated: 2017-06-16Bibliographically approved
Organisations

Search in DiVA

Show all publications