Change search
Refine search result
1 - 17 of 17
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Adamov, Alexander
    et al.
    Kharkiv Natl Univ Radio Elect, NioGuard Secur Lab, Kharkov, Kharkiv Oblast, Ukraine..
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    A Sandboxing Method to Protect Cloud Cyberspace2015In: PROCEEDINGS OF 2015 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), IEEE Communications Society, 2015Conference paper (Refereed)
    Abstract [en]

    This paper addresses the problem of protecting cloud environments against targeted attacks, which have become a popular mean of gaining access to organization's confidential information and resources of cloud providers. Only in 2015 eleven targeted attacks have been discovered by Kaspersky Lab. One of them - Duqu2 - successfully attacked the Lab itself. In this context, security researchers show rising concern about protecting corporate networks and cloud infrastructure used by large organizations against such type of attacks. This article describes a possibility to apply a sandboxing method within a cloud environment to enforce security perimeter of the cloud.

  • 2.
    Adamov, Alexander
    et al.
    Harkivskij Nacionalnij Universitet Radioelectroniki, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Cloud incident response model2016In: Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper (Refereed)
    Abstract [en]

    This paper addresses the problem of incident response in clouds. A conventional incident response model is formulated to be used as a basement for the cloud incident response model. Minimization of incident handling time is considered as a key criterion of the proposed cloud incident response model that can be done at the expense of embedding infrastructure redundancy into the cloud infrastructure represented by Network and Security Controllers and introducing Security Domain for threat analysis and cloud forensics. These architectural changes are discussed and applied within the cloud incident response model. © 2016 IEEE.

  • 3.
    Adamov, Alexander
    et al.
    Kharkiv National University of Radioelectronics, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    The state of ransomware: Trends and mitigation techniques2017In: Proceedings of 2017 IEEE East-West Design and Test Symposium, EWDTS 2017, Institute of Electrical and Electronics Engineers Inc. , 2017, article id 8110056Conference paper (Refereed)
    Abstract [en]

    This paper contains an analysis of the payload of the popular ransomware for Windows, Android, Linux, and MacOSX platforms. Namely, VaultCrypt (CrypVault), TeslaCrypt, NanoLocker, Trojan-Ransom.Linux.Cryptor, Android Simplelocker, OSX/KeRanger-A, WannaCry, Petya, NotPetya, Cerber, Spora, Serpent ransomware were put under the microscope. A set of characteristics was proposed to be used for the analysis. The purpose of the analysis is generalization of the collected data that describes behavior and design trends of modern ransomware. The objective is to suggest ransomware threat mitigation techniques based on the obtained information. The novelty of the paper is the analysis methodology based on the chosen set of 13 key characteristics that helps to determine similarities and differences thorough the list of ransomware put under analysis. Most of the ransomware samples presented were manually analyzed by the authors eliminating contradictions in descriptions of ransomware behavior published by different malware research laboratories through verification of the payload of the latest versions of ransomware. © 2017 IEEE.

  • 4.
    Carlsson, Anders
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Gustavsson, Rune
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Resilient Smart Grids2014In: 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), IEEE , 2014, p. 79-82Conference paper (Refereed)
    Abstract [en]

    The usefulness of configurable and shared experiment platforms in design and implementation of future Resilient Smart Grids is demonstrated. A set of antagonistic threats is identified and remotely controlled experiments to harness those are presented and assessed.

  • 5.
    Carlsson, Anders
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Gustavsson, Rune
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    The art of war in the cyber world2018In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 42-44Conference paper (Refereed)
    Abstract [en]

    The paper focus on cyber weapons used in Advanced Persistent Threat (ATP) attacks in present and future cyber warfare. The combined use of propaganda and cyber warfare supports military operations on the ground and is exemplified with the ongoing Russian hybrid warfare in Ukraine. New models and methods to develop future trustworthy critical infrastructures in our societies are presented. Some mitigation ideas to meet the challenges of future hybrid warfare are also discussed. © 2017 IEEE.

  • 6.
    Carlsson, Anders
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Kuzminykh, Ievgeniia
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Gustavsson, Rune
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Virtual Security Labs Supporting Distance Education in ReSeLa Framework2019In: Advances in Intelligent Systems and Computing / [ed] Auer M.E.,Tsiatsos T., Springer Verlag , 2019, Vol. 917, p. 577-587Conference paper (Refereed)
    Abstract [en]

    To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested. © 2019, Springer Nature Switzerland AG.

  • 7.
    Duravkin, Ievgen
    et al.
    Kharkiv Natl Univ Radioelect, UKR.
    Loktionova, Anastasiya
    Kharkiv Natl Univ Radioelect, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Method of Slow-Attack Detection2014In: 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), IEEE , 2014, p. 171-172Conference paper (Refereed)
    Abstract [en]

    The analysis of realization low-intensity HTTP-attacks was performed. Were described scenarios of Slowloris, Slow POST and Slow READ attack. Features of this type of attacks in comparison with low-level attacks such as "denial of service" were selected: they do not require a large number of resources from the attacking machine, and they are difficult for the detection, since their parameters are similar to legitimate traffic. For each type of attacks the characteristic features were high-lighted. Parameters of http-request, which assume the detection of this type attacks highlighted. The analysis of mathematical tools of building the models for the systems for these types of attacks detection on the basis of the obtained parameters was performed.

  • 8. Gharibi, Wajeb Gharib
    et al.
    Hahanov, Vladimir
    Carlsson, Anders
    Blekinge Institute of Technology, School of Computing.
    Hahanova, Irina
    Filippenko, Inna
    Quantum technology for analysis and testing computing systems2013Conference paper (Refereed)
    Abstract [en]

    A theory of quantum models, methods and algorithms for improving the performance of existing software and hardware tools for analysis and synthesis of digital computing devices by increasing the dimension of the data structures and memory are proposed. The basic concepts, terminology and definitions are introduced, which are necessary for the understanding the theory and practice of quantum computation.

  • 9.
    Kuzminykh, Ievgeniia
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture2018In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118 / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds), Springer, 2018, Vol. 11118, p. 52-63Conference paper (Refereed)
    Abstract [en]

    This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.

  • 10.
    Kuzminykh, Ievgeniia
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Franksson, Robin
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Liljegren, Alexander
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Measuring a LoRa Network: Performance, Possibilities and Limitations2018In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O., Andreev S., Balandin S., Koucheryavy Y., Springer, 2018, Vol. 11118, p. 116-128Conference paper (Refereed)
    Abstract [en]

    Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.

  • 11.
    Kuzminykh, Ievgeniia
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Yevdokymenko, Maryna
    Kharkiv National University of Radio, UKR.
    Sokolov, V. Yu
    Borys Grinchenko Kyiv University, UKR.
    Investigation of the IoT Device Lifetime with Secure Data Transmission2019In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Galinina O.,Andreev S.,Koucheryavy Y.,Balandin S., Springer Verlag , 2019, Vol. 11660, p. 16-27Conference paper (Refereed)
    Abstract [en]

    This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used. © 2019, Springer Nature Switzerland AG.

  • 12.
    Kuzminykh, Ievgeniia
    et al.
    Harkivskij Nacionalnij Universitet Radioelectroniki, UKR.
    Snihurov, Arkadii
    Harkivskij Nacionalnij Universitet Radioelectroniki, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Testing of communication range in ZigBee technology2017In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 133-136, article id 7916102Conference paper (Refereed)
    Abstract [en]

    - In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters. © 2017 IEEE.

  • 13.
    Kuzminykh, Ievgeniia
    et al.
    Kharkiv National University, UKR.
    Snihurov, Arkadii
    Kharkiv National University, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Testing of communication range in ZigBee technology2017In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper (Refereed)
    Abstract [en]

    Abstract:In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters.

  • 14.
    Kuzminykh, Ievgeniia
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Sokolov, Vladimir
    State University of Telecommunication, UKR.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Scheme for dynamic channel allocation with interference reduction in wireless sensor network2017In: 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) / [ed] IEEE, IEEE, 2017, p. 564-568Conference paper (Refereed)
    Abstract [en]

    he paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.

  • 15.
    Tutschku, Kurt
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Ahmadi Mehri, Vida
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Chivukula, Krishna Varaynya
    CityNetwork Webbhotell AB.
    Johan, Christenson
    CityNetwork Webbhotell AB.
    On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures2016In: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, p. 442-447Conference paper (Refereed)
    Abstract [en]

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to enable OPEX savings. We put a focus on monitoring resources on small time-scales and on the variation observed on such scales. We introduce a QoE-based comparative concept that relates guest and host views on "utilisation" and "load" for the analysis of the variations. We describe the order of variations in "utilisation" and "load" by measurement and by graphical analysis of the measurements. We do these evaluations for different host operating systems and monitoring tools.

  • 16.
    Tutschku, Kurt Tutschku
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Ahmadi Mehri, Vida
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Carlsson, Anders
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures2016Conference paper (Refereed)
    Abstract [en]

    Cloud Networking (CN) and related conceptsoffer appealing novelties to Cloud Computing (CC) customers.They can do a one-stop-shopping for network-enhanced cloudservices. In addition, the costs of such services might below due to multiple customers sharing the infrastructures.Moreover, telecommunication network operators are adopt-ing the CN in theirNetwork Functions Virtualisation (NFV)framework for reducing costs and increasing the flexibility oftheir networks. The technical appeal of CN comes from thetight integration of CC and smart networks. The economicalattractiveness results from avoiding dedicated hardware, shar-ing of resources, and simplified resource management (RM) asseen by the users respectively by the applications. The visionof cheap and integrated CN services is obviously attractive,but it is also evident that it will require more complex RMprocedures for efficiently balancing the usage of all resources.In this contribution, we suggest an initial architecture forintegrated and practical RM in CN and NFV systems. TheRM concept aims at locating and analysing performancebottlenecks, efficiency problems, and eventually discover un-used resources. The suggested architecture is based on alayered view on the system. Moreover, we detail difficultiesin practical resources usage monitoring which, in turn, definerequirements for a RM architecture. The requirement analysisis based on measurements in a CN infrastructure.

  • 17.
    Yevdokymenko, Maryna
    et al.
    Kharkiv Natl Univ Radio Elect, UKR.
    Shapovalova, Anastasiia
    Kharkiv Natl Univ Radio Elect, UKR.
    Voloshchuk, Olena
    Kharkiv Natl Univ Radio Elect, UKR.
    Carlsson, Anders
    Blekinge Inst Technol, Comp & Commun Syst Dept, Karlskrona, Sweden..
    Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment2018In: 2018 International Scientific-Practical Conference on Problems of Infocommunications Science and Technology, PIC S and T 2018 - Proceedings: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), IEEE , 2018, p. 609-612, article id 8632079Conference paper (Refereed)
    Abstract [en]

    The paper explores methods for assessing vulnerabilities and assessing the spread of an attack in an infocommunication network. A proactive approach to the quantitative assessment of network security, which allows us to assess risks at the user and network level through the presence of vulnerabilities is presented. The proposed solutions will be useful for decision making and will be further integrated into a single metric for displaying the integrated level of security of the infocommunication network.

1 - 17 of 17
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf