Difference between revisions of "Dissemination"

From Asset
Jump to: navigation, search
(Publications)
(Publications)
Line 1: Line 1:
 
= Publications<br/> =
 
= Publications<br/> =
 +
* Waqas Aman and Einar Snekkenes, '''Managing Security Trade-offs in the Internet of Things Using Adaptive Security''', 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK.
 
* Oshin, T.O., Poslad S.  Zhang, Z.  '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
 
* Oshin, T.O., Poslad S.  Zhang, Z.  '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
 
* Evesti A., Suomalainen J., Savola R., '''Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application.''' In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
 
* Evesti A., Suomalainen J., Savola R., '''Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application.''' In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449

Revision as of 10:18, 7 December 2015

Publications

  • Waqas Aman and Einar Snekkenes, Managing Security Trade-offs in the Internet of Things Using Adaptive Security, 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK.
  • Oshin, T.O., Poslad S. Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
  • Evesti A., Suomalainen J., Savola R., Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application. In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
  • Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, Risk-Driven Security Metrics Development for an e-Health IoT Application, Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
  • Waqas Aman and EinarSnekkenes. 2015. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 2015, 7, 225-256.
  • Pål Ander Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC, IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015
  • Kashif Habib and Wolfgang Leister, Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures, NTMS 2015, Paris; 07/2015
  • Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth. The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. Best Paper Award.
  • Kashif Habib and Wolfgang Leister. 2015. Context-Aware Authentication for the Internet of Things. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6.
  • Inaki Garitano, Seraj Fayyad, and Josef Noll, Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems, Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z
  • Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers.
  • Zhang, Z., Poslad S. Improved Use of Foot Force Sensors and Mobile Phone GPS for Mobility Activity Recognition. IEEE Sensors J, 2014, 14(12), 4340-4347. (IF=1.8), OA, DOI: 10.1109/JSEN.2014.2331463. Best Journal Paper award for 2014.
  • Seraj Fayyad and Josef Noll, "Security and Safety Composition Methodology," CENTRIC 2014, 2014, pp. 60-65.
  • Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, An Evaluation Framework for Adaptive Security for the IoT in eHealth, International Journal on Advances in Security, 7(3&4), 2014, pp 93-109
  • Kashif Habib. 2014. Ethical aspects of the Internet of Things in eHealth. Journal of International Center for Information Ethics, Ethics for the Internet of Things, Vol. 22 - December 2014. ISSN 1614 -1687.
  • Oshin, T.O., Poslad S, Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846
  • Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. A Survey on Sensing, Signal Processing, and Communication for Wireless Body Area Networks. In ZTE Communications, 2014 (in press)
  • Antti Evesti, Habtamu Abie, Reijo Savola, Security Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
  • Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
  • Waqas Aman and Einar Snekkenes, 2014. Event Driven Adaptive Security in Internet of Things, UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy
  • Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. Best Paper Awards.
  • Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
  • Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
  • Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels, Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013
  • Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
  • Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
  • Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
  • Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
  • Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
  • Reijo Savola and Habtamu Abie. 2013. Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management.  Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
  • Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
  • Oshin T, Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. Best Paper Awards.
  • Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
  • Kashif Habib and Wolfgang Leister. 2013. Adaptive Security for the Internet of Things Reference Model. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24
  • Habtamu Abie and Ilangko Balasingham. 2012. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
  • Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281

Public Deliverables

  • Habtamu Abie, Wolfgang Leister, and Trenton Schulz. ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. NR-notat DART/01/2014. pp 28. 2014.
  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
  • Yared Berhanu Woldegiorgis, Habtamu Abie. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
  • Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, Defining the ASSET Scenarios,Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
  • Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS

Workshops and Conferences