Difference between revisions of "Dissemination"
From Asset
(→The successful completion of the ASPI 2013 Workshop) |
(→Publications) |
||
(79 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | =Publications= | + | = Publications<br/> = |
− | * | + | * Waqas Aman, '''Assessing the Feasibility of Adaptive Security Models for the Internet of Things''', Chapter, Human Aspects of Information Security, Privacy, and Trust (HAS 2016), LNCS, Springer, Vol 9750, pp 201-211, 21 June 2016 |
− | + | * Waqas Aman and Einar Snekkenes, '''Managing Security Trade-offs in the Internet of Things Using Adaptive Security''', 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK. | |
− | * | + | * Oshin, T.O., Poslad S. Zhang, Z. '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984 |
− | * | + | * Evesti A., Suomalainen J., Savola R., '''Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application.''' In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449 |
− | * Reijo Savola | + | * Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, '''Risk-Driven Security Metrics Development for an e-Health IoT Application''', Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3 |
− | * | + | * Waqas Aman and EinarSnekkenes. 2015. '''EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.''' Future Internet 2015, 7, 225-256. |
− | * | + | * Pål Ander Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. '''On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC''', IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015 |
− | * | + | * Kashif Habib and Wolfgang Leister, '''Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures''', NTMS 2015, Paris; 07/2015 |
− | * | + | * Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. '''Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth.''' The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. '''Best Paper Award.''' |
+ | * Kashif Habib and Wolfgang Leister. 2015. '''Context-Aware Authentication for the Internet of Things'''. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6. | ||
− | * Habtamu Abie and Ilangko Balasingham, [http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275 | + | * Inaki Garitano, Seraj Fayyad, and Josef Noll, '''Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems''', Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z |
− | * Reijo Savola, Habtamu Abie, and Markus Sihvonen | + | * Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, '''Measurable Security, Privacy and Dependability in Smart Grids''', Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers. |
+ | * Zhang, Z., Poslad S. '''Improved Use of Foot Force Sensors and Mobile Phone GPS for Mobility Activity Recognition'''. IEEE Sensors J, 2014, 14(12), 4340-4347. (IF=1.8), OA, DOI: 10.1109/JSEN.2014.2331463. '''Best Journal Paper award for 2014.''' | ||
+ | * Seraj Fayyad and Josef Noll, "'''Security and Safety Composition Methodology'''," CENTRIC 2014, 2014, pp. 60-65. | ||
+ | * Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, [http://publications.nr.no/1420562301/Leister_etal_EvaluationFramework_jsec14n34_51005.pdf '''An Evaluation Framework for Adaptive Security for the IoT in eHealth'''], International Journal on Advances in Security, 7(3&4), 2014, pp 93-109 | ||
+ | * Kashif Habib. 2014. '''Ethical aspects of the Internet of Things in eHealth'''. Journal of International Center for Information Ethics, Ethics for the Internet of Things, Vol. 22 - December 2014. ISSN 1614 -1687. | ||
+ | *Oshin, T.O., Poslad S, Zhang, Z. '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846 | ||
+ | *Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. '''Sensing, Signal Processing, and Communication for Wireless Body Area Networks'''. In ZTE Communications, Vol.12 No. 3, 03-12, September 2014 | ||
+ | *Antti Evesti, Habtamu Abie, Reijo Savola, '''Security Measuring for Self-adaptive Security,''' ECSAW, August 25 - 29 2014, Vienna, Austria | ||
+ | *Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, '''Towards Run-Time Verification of Adaptive Security for IoT in eHealth''', ECSAW, August 25 - 29 2014, Vienna, Austria. | ||
+ | *Waqas Aman and Einar Snekkenes, 2014. '''Event Driven Adaptive Security in Internet of Things''', UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy | ||
+ | *Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. '''A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth'''. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. '''Best Paper Awards'''. | ||
+ | *Mohamed Hamdi and Habtamu Abie, '''Game-Based Adaptive Security in the Internet of Things for eHealth''', IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014 | ||
+ | *Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. '''An evaluation scenario for Adaptive Security in eHealth'''. In PESARO 2014, February 23 - 27, 2014 - Nice, France | ||
+ | * Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. '''Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels''', Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013 | ||
+ | *Zelun Zhang and Stefan Poslad. 2013. '''Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition''', Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918 | ||
+ | *Denis Trcek and Andrej Brodnik. 2013. '''Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health'''. IEEE Wireless Communications, August 2013, pp. 2-9 | ||
+ | *Reijo M. Savola. 2013. '''Quality of security metrics and measurements'''. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, [http://dx.doi.org/10.1016/j.cose.2013.05.002 http://dx.doi.org/10.1016/j.cose.2013.05.002] | ||
+ | *Mohamed Hamdi. 2013. '''Secure Cooperative Physical-layer Coding for the Internet of Things'''. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523505 http://dx.doi.org/10.1145/2523501.2523505] | ||
+ | *Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. '''A Testbed for Adaptive Security for IoT in eHealth'''. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523506 http://dx.doi.org/10.1145/2523501.2523506] | ||
+ | *Reijo Savola and Habtamu Abie. 2013. '''Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management.''' Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523507 http://dx.doi.org/10.1145/2523501.2523507] | ||
+ | *Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. '''Adaptive Security & Privacy management for the Internet of Things (ASPI 2013)'''. In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, [http://dx.doi.org/10.1145/2494091.2499770 http://dx.doi.org/10.1145/2494091.2499770] | ||
+ | *Oshin T, Stefan Poslad. 2013. '''"ERSP: An Energy-efficient Real-time Smartphone Pedometer"'''. 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013. | ||
+ | *Zhang Z, Stefan Poslad. 2013. '''A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition.''' In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013. | ||
+ | *Waqas Aman and Einar Snekkenes. 2013. '''An Empirical Research on InfoSec Risk Management in IoT based eHealth'''. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. '''Best Paper Awards.''' | ||
+ | *Waqas Aman, 2013. '''Modeling Adaptive Security in IoT Driven eHealth.''' The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69 | ||
+ | *Kashif Habib and Wolfgang Leister. 2013. '''Adaptive Security for the Internet of Things Reference Model'''. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24 | ||
+ | *Habtamu Abie and Ilangko Balasingham. 2012. '''[http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]'''. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275 | ||
+ | *Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. '''[http://dl.acm.org/citation.cfm?id=2442753&CFID=182090968&CFTOKEN=70357592 Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications].''' In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281 | ||
=Public Deliverables= | =Public Deliverables= | ||
− | * Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, [http://publications.nr.no/1362403013/DART-17-2012.pdf Defining the ASSET Scenarios],Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR | + | * Habtamu Abie, Wolfgang Leister. '''Case Study Validation: Deliverable D6.3'''. Oslo: Norsk Regnesentral 2015 20 s. NR-notat(DART/18/2015) |
− | * Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, [http://publications.nr.no/1362402875/DART-16-2012.pdf Defining the ASSET Lab], Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS | + | * Habtamu Abie, Wolfgang Leister. '''Case Study Simulation and Evaluation: Deliverable 6.2'''. Oslo: Norsk Regnesentral 2015 15 s. NR-notat(DART/17/2015) |
+ | * Habtamu Abie, Wolfgang Leister. '''Case Study Gap Analysis: Deliverable D6.1'''. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/16/2015) | ||
+ | * Habtamu Abie. '''Evaluation and Validation Using Metrics: Deliverable D5.2'''. Oslo: Norsk Regnesentral 2015 22 s. NR-notat(DART/15/2015) | ||
+ | * Habtamu Abie. '''Development of Metrics: Deliverable D5.1.''' Oslo: Norsk Regnesentral 2015 26 s. NR-notat(DART/14/2015) | ||
+ | * Habtamu Abie. '''Optimizing and Combining Algorithms: Deliverable D4.3'''. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/13/2015) | ||
+ | * Habtamu Abie. '''Prototyping of Methods: Deliverable D4.2'''. Oslo: Norsk Regnesentral 2015 19 s. NR-notat(DART/12/2015) | ||
+ | * Habtamu Abie. '''Game Theory and Risk Models: Deliverable D4.1'''. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/11/2015) | ||
+ | * Habtamu Abie. '''ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015'''. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/08/2015) | ||
+ | * Habtamu Abie, Stefan Poslad, Wolfgang Leister. '''ASSET Project 213131 2015 Final Annual Meeting''', 05-06 March: Meeting Minutes & Documentation. Oslo: Norsk Regnesentral 2015 25 s. NR-notat(DART/07/2015) | ||
+ | * Denis Trcek, Habtamu Abie, Åsmund Skomedal. '''Trust based Adaptive Safety for Sensor Networks in e-Health'''. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/06/2015) | ||
+ | * Mohamed Hamdi, Habtamu Abie. '''A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things'''. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/05/2015) | ||
+ | * Habtamu Abie. '''ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014''', September 30,2014. Oslo: NR 2014 22 s. NR-notat(DART/07/2014) | ||
+ | * Habtamu Abie, Wolfgang Leister, and Trenton Schulz. '''ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation'''. NR-notat DART/01/2014. pp 28. 2014. | ||
+ | * Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, '''Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth''', Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013 | ||
+ | * Habtamu Abie, Mohamed Hamdi, Stefan Poslad, '''Analysis of Reasoning Methods''', Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013 | ||
+ | * Habtamu Abie. '''ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013'''. Oslo: Norsk Regnesentral 2013 22 s. NR-notat(DART/11/2013) | ||
+ | * Yared Berhanu Woldegiorgis, Habtamu Abie. '''Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth''', NR-Notat (DART/07/2013), 16. August. 2013 | ||
+ | * Lothar Fritsch, Habtamu Abie. '''2nd PETweb II & ASSET joint PhD Seminar'''. Oslo: Norsk Regnesentral 2013 99 s. NR-notat(DART/01/2013) | ||
+ | * Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, [http://publications.nr.no/1362403013/DART-17-2012.pdf '''Defining the ASSET Scenarios'''],Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR | ||
+ | * Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, [http://publications.nr.no/1362402875/DART-16-2012.pdf '''Defining the ASSET Lab'''], Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS | ||
=Workshops and Conferences= | =Workshops and Conferences= | ||
+ | *[http://asset.nr.no/asset/index.php/MeSSa2016 3rd International Workshop on Monitoring and Measurability of Software and Network Security held in conjunction with The 10th European Conference on Software Architecture (ECSA 2016), September 5-9, 2016, Istanbul, Turkey] | ||
+ | *[http://asset.nr.no/asset/index.php/MeSSa2014 2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria] | ||
+ | |||
*[[media:NR_ASSET_Conference_IoT_Oslo_19_03_2013.pdf|ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway]] | *[[media:NR_ASSET_Conference_IoT_Oslo_19_03_2013.pdf|ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway]] | ||
*[http://settit.bodynets.org/2013/show/home Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013] co-located with the [http://bodynets.org/2013/show/home BodyNets 2013 Conference] sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013. | *[http://settit.bodynets.org/2013/show/home Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013] co-located with the [http://bodynets.org/2013/show/home BodyNets 2013 Conference] sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013. | ||
*[[media:CFP SeTTIT 2013.pdf|Call For Papers SeTTIT 2013 in PDF]] | *[[media:CFP SeTTIT 2013.pdf|Call For Papers SeTTIT 2013 in PDF]] | ||
*[http://asset.nr.no/asset/index.php/ASPI2013 International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013)] Co-located with the [http://www.ubicomp.org/ubicomp2013/ 15th ACM International Conference on Ubiquitous Computing (UbiComp2013]], September 8th (Sunday) 2013, Zurich, Switzerland | *[http://asset.nr.no/asset/index.php/ASPI2013 International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013)] Co-located with the [http://www.ubicomp.org/ubicomp2013/ 15th ACM International Conference on Ubiquitous Computing (UbiComp2013]], September 8th (Sunday) 2013, Zurich, Switzerland | ||
− | + | *[http://asset.nr.no/asset/index.php/SeTTIT_2012_Completion The Successful Completion of the SeTTIT 2012 Workshop] | |
− | + | *[http://asset.nr.no/asset/index.php/ASPI_2013_Completion The Successful Completion of the ASPI 2013 Workshop] | |
− | |||
− | |||
− | |||
− | * | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | * | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | The | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | Workshop | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Latest revision as of 08:58, 11 July 2016
Publications
- Waqas Aman, Assessing the Feasibility of Adaptive Security Models for the Internet of Things, Chapter, Human Aspects of Information Security, Privacy, and Trust (HAS 2016), LNCS, Springer, Vol 9750, pp 201-211, 21 June 2016
- Waqas Aman and Einar Snekkenes, Managing Security Trade-offs in the Internet of Things Using Adaptive Security, 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK.
- Oshin, T.O., Poslad S. Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
- Evesti A., Suomalainen J., Savola R., Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application. In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
- Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, Risk-Driven Security Metrics Development for an e-Health IoT Application, Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
- Waqas Aman and EinarSnekkenes. 2015. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 2015, 7, 225-256.
- Pål Ander Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC, IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015
- Kashif Habib and Wolfgang Leister, Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures, NTMS 2015, Paris; 07/2015
- Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth. The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. Best Paper Award.
- Kashif Habib and Wolfgang Leister. 2015. Context-Aware Authentication for the Internet of Things. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6.
- Inaki Garitano, Seraj Fayyad, and Josef Noll, Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems, Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z
- Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers.
- Zhang, Z., Poslad S. Improved Use of Foot Force Sensors and Mobile Phone GPS for Mobility Activity Recognition. IEEE Sensors J, 2014, 14(12), 4340-4347. (IF=1.8), OA, DOI: 10.1109/JSEN.2014.2331463. Best Journal Paper award for 2014.
- Seraj Fayyad and Josef Noll, "Security and Safety Composition Methodology," CENTRIC 2014, 2014, pp. 60-65.
- Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, An Evaluation Framework for Adaptive Security for the IoT in eHealth, International Journal on Advances in Security, 7(3&4), 2014, pp 93-109
- Kashif Habib. 2014. Ethical aspects of the Internet of Things in eHealth. Journal of International Center for Information Ethics, Ethics for the Internet of Things, Vol. 22 - December 2014. ISSN 1614 -1687.
- Oshin, T.O., Poslad S, Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846
- Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. Sensing, Signal Processing, and Communication for Wireless Body Area Networks. In ZTE Communications, Vol.12 No. 3, 03-12, September 2014
- Antti Evesti, Habtamu Abie, Reijo Savola, Security Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
- Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
- Waqas Aman and Einar Snekkenes, 2014. Event Driven Adaptive Security in Internet of Things, UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy
- Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. Best Paper Awards.
- Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
- Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
- Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels, Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013
- Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
- Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
- Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
- Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
- Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
- Reijo Savola and Habtamu Abie. 2013. Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
- Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
- Oshin T, Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
- Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
- Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. Best Paper Awards.
- Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
- Kashif Habib and Wolfgang Leister. 2013. Adaptive Security for the Internet of Things Reference Model. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24
- Habtamu Abie and Ilangko Balasingham. 2012. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
- Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281
Public Deliverables
- Habtamu Abie, Wolfgang Leister. Case Study Validation: Deliverable D6.3. Oslo: Norsk Regnesentral 2015 20 s. NR-notat(DART/18/2015)
- Habtamu Abie, Wolfgang Leister. Case Study Simulation and Evaluation: Deliverable 6.2. Oslo: Norsk Regnesentral 2015 15 s. NR-notat(DART/17/2015)
- Habtamu Abie, Wolfgang Leister. Case Study Gap Analysis: Deliverable D6.1. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/16/2015)
- Habtamu Abie. Evaluation and Validation Using Metrics: Deliverable D5.2. Oslo: Norsk Regnesentral 2015 22 s. NR-notat(DART/15/2015)
- Habtamu Abie. Development of Metrics: Deliverable D5.1. Oslo: Norsk Regnesentral 2015 26 s. NR-notat(DART/14/2015)
- Habtamu Abie. Optimizing and Combining Algorithms: Deliverable D4.3. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/13/2015)
- Habtamu Abie. Prototyping of Methods: Deliverable D4.2. Oslo: Norsk Regnesentral 2015 19 s. NR-notat(DART/12/2015)
- Habtamu Abie. Game Theory and Risk Models: Deliverable D4.1. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/11/2015)
- Habtamu Abie. ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/08/2015)
- Habtamu Abie, Stefan Poslad, Wolfgang Leister. ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation. Oslo: Norsk Regnesentral 2015 25 s. NR-notat(DART/07/2015)
- Denis Trcek, Habtamu Abie, Åsmund Skomedal. Trust based Adaptive Safety for Sensor Networks in e-Health. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/06/2015)
- Mohamed Hamdi, Habtamu Abie. A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/05/2015)
- Habtamu Abie. ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014. Oslo: NR 2014 22 s. NR-notat(DART/07/2014)
- Habtamu Abie, Wolfgang Leister, and Trenton Schulz. ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. NR-notat DART/01/2014. pp 28. 2014.
- Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
- Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
- Habtamu Abie. ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013. Oslo: Norsk Regnesentral 2013 22 s. NR-notat(DART/11/2013)
- Yared Berhanu Woldegiorgis, Habtamu Abie. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
- Lothar Fritsch, Habtamu Abie. 2nd PETweb II & ASSET joint PhD Seminar. Oslo: Norsk Regnesentral 2013 99 s. NR-notat(DART/01/2013)
- Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, Defining the ASSET Scenarios,Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
- Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS
Workshops and Conferences
- 3rd International Workshop on Monitoring and Measurability of Software and Network Security held in conjunction with The 10th European Conference on Software Architecture (ECSA 2016), September 5-9, 2016, Istanbul, Turkey
- 2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria
- ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway
- Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013 co-located with the BodyNets 2013 Conference sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.
- Call For Papers SeTTIT 2013 in PDF
- International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013) Co-located with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013], September 8th (Sunday) 2013, Zurich, Switzerland
- The Successful Completion of the SeTTIT 2012 Workshop
- The Successful Completion of the ASPI 2013 Workshop