Difference between revisions of "Dissemination"
From Asset
(→Publications) |
(→Publications) |
||
Line 1: | Line 1: | ||
= Publications<br/> = | = Publications<br/> = | ||
+ | * Evesti A., Suomalainen J., Savola R., '''Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application.''' In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449 | ||
* Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, '''Risk-Driven Security Metrics Development for an e-Health IoT Application''', Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3 | * Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, '''Risk-Driven Security Metrics Development for an e-Health IoT Application''', Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3 | ||
* Waqas Aman and EinarSnekkenes. 2015. '''EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.''' Future Internet 2015, 7, 225-256. | * Waqas Aman and EinarSnekkenes. 2015. '''EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.''' Future Internet 2015, 7, 225-256. |
Revision as of 10:14, 17 September 2015
Publications
- Evesti A., Suomalainen J., Savola R., Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application. In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
- Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, Risk-Driven Security Metrics Development for an e-Health IoT Application, Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
- Waqas Aman and EinarSnekkenes. 2015. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 2015, 7, 225-256.
- Pål Ander Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC, IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015
- Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth. The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. Best Paper Award.
- Kashif Habib and Wolfgang Leister. 2015. Context-Aware Authentication for the Internet of Things. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6.
- Inaki Garitano, Seraj Fayyad, and Josef Noll, Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems, Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z
- Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers.
- Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, An Evaluation Framework for Adaptive Security for the IoT in eHealth, International Journal on Advances in Security, 7(3&4), 2014, pp 93-109
- Oshin, T.O., Poslad S, Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846
- Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. A Survey on Sensing, Signal Processing, and Communication for Wireless Body Area Networks. In ZTE Communications, 2014 (in press)
- Antti Evesti, Habtamu Abie, Reijo Savola, Security Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
- Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
- Waqas Aman and Einar Snekkenes, 2014. Event Driven Adaptive Security in Internet of Things, UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy
- Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. Best Paper Awards.
- Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
- Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
- Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels, Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013
- Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
- Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
- Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
- Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
- Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
- Reijo Savola and Habtamu Abie. 2013. Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
- Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
- Oshin T, Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
- Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
- Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. Best Paper Awards.
- Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
- Kashif Habib and Wolfgang Leister. 2013. Adaptive Security for the Internet of Things Reference Model. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24
- Habtamu Abie and Ilangko Balasingham. 2012. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
- Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281
Public Deliverables
- Habtamu Abie, Wolfgang Leister, and Trenton Schulz. ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. NR-notat DART/01/2014. pp 28. 2014.
- Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
- Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
- Yared Berhanu Woldegiorgis, Habtamu Abie. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
- Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, Defining the ASSET Scenarios,Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
- Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS
Workshops and Conferences
- 3rd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 9th European Conference on Software Architecture (ECSA 2015), September 08, 2015, Dubrovnik/Cavtat, Croatia
- 2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria
- ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway
- Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013 co-located with the BodyNets 2013 Conference sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.
- Call For Papers SeTTIT 2013 in PDF
- International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013) Co-located with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013], September 8th (Sunday) 2013, Zurich, Switzerland
- The Successful Completion of the SeTTIT 2012 Workshop
- The Successful Completion of the ASPI 2013 Workshop