Difference between revisions of "Dissemination"

From Asset
Jump to: navigation, search
(Publications)
(Publications)
Line 1: Line 1:
 
=Publications=
 
=Publications=
 
* Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
 
* Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
 +
* Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
 
* Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
 
* Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
 
* Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
 
* Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
Line 10: Line 11:
 
* Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
 
* Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
 
* Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013
 
* Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013
* Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013)
+
* Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
* Habib, K., Leister, W., Adaptive Security for the Internet of Things Reference Model, Norwegian Information Security Conference-NISK 2013, pp. 1-12
+
* Habib, K., Leister, W., Adaptive Security for the Internet of Things Reference Model, Norwegian Information Security Conference-NISK 2013, pp. 13-24
  
 
* Habtamu Abie and Ilangko Balasingham. 2012. [http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
 
* Habtamu Abie and Ilangko Balasingham. 2012. [http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275

Revision as of 13:30, 9 December 2013

Publications

  • Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
  • Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
  • Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
  • Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
  • Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
  • Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
  • Reijo Savola and Habtamu Abie. 2013. Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management. ”, Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
  • Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
  • Oshin T, Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013
  • Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
  • Habib, K., Leister, W., Adaptive Security for the Internet of Things Reference Model, Norwegian Information Security Conference-NISK 2013, pp. 13-24

Public Deliverables

  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
  • Yared Berhanu Woldegiorgis, Habtamu Abie. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
  • Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, Defining the ASSET Scenarios,Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
  • Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS

Workshops and Conferences