SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Lindskog Stefan) "

Search: WFRF:(Lindskog Stefan)

  • Result 1-50 of 163
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Afzal, Zeeshan, 1991- (author)
  • Towards Secure Multipath TCP Communication
  • 2017
  • Licentiate thesis (other academic/artistic)abstract
    • The evolution in networking coupled with an increasing demand to improve user experience has led to different proposals to extend the standard TCP. Multipath TCP (MPTCP) is one such extension that has the potential to overcome few inherent limitations in the standard TCP. While MPTCP's design and deployment progresses, most of the focus has been on its compatibility. The security aspect is confined to making sure that the MPTCP protocol itself offers the same security level as the standard TCP.The topic of this thesis is to investigate the unexpected security implications raised by using MPTCP in the traditional networking environment. The Internet of today has security middle-boxes that perform traffic analysis to detect intrusions and attacks. Such middle-boxes make use of different assumptions about the traffic, e.g., traffic from a single connection always arrives along the same path. This along with many other assumptions may not be true anymore with the advent of MPTCP as traffic can be fragmented and sent over multiple paths simultaneously.We investigate how practical it is to evade a security middle-box by fragmenting and sending traffic across multiple paths using MPTCP. Realistic attack traffic is used to evaluate such attacks against Snort IDS to show that these attacks are feasible. We then go on to propose possible solutions to detect such attacks and implement them in an MPTCP proxy. The proxy aims to extend the MPTCP performance advantages to servers that only support standard TCP, while ensuring that intrusions can be detected as before. Finally, we investigate the potential MPTCP scenario where security middle-boxes only have access to some of the traffic. We propose and implement an algorithm to perform intrusion detection in such situations and achieve a nearly 90% detection accuracy. Another contribution of this work is a tool, that converts IDS rules into equivalent attack traffic to automate the evaluation of a middle-box.
  •  
2.
  • Berthold, Stefan (author)
  • Inter-temporal Privacy Metrics
  • 2014
  • Doctoral thesis (other academic/artistic)abstract
    • Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied, distributed, and long-term stored at negligible costs. This has dramatic consequences for individuals that leave traces in the form of personal data whenever they interact with information technology, for instance, computers and phones; or even when information technology is recording the personal data of aware or unaware individuals. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology.The objective of this thesis is to study the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party which uses this data for re-identifying the individual within a set of other individuals. We contribute with privacy metrics for several instances of this scenario in the publications included in this thesis, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. The result is a new framework for inter-temporal privacy metrics.
  •  
3.
  • Berthold, Stefan, 1982- (author)
  • Towards Inter-temporal Privacy Metrics
  • 2011
  • Licentiate thesis (other academic/artistic)abstract
    • Informational privacy of individuals has significantly gained importance after information technology has become widely deployed. Data, once digitalised, can be copied and distributed at negligible costs. This has dramatic consequences for individuals that leave traces in form of personal data whenever they interact with information technology. The right of individuals for informational privacy, in particular to control the flow and use of their personal data, is easily undermined by those controlling the information technology. The objective of this thesis is the measurement of informational privacy with a particular focus on scenarios where an individual discloses personal data to a second party, the data controller, which uses this data for re-identifying the individual within a set of others, the population. Several instances of this scenario are discussed in the appended papers, most notably one which adds a time dimension to the scenario for modelling the effects of the time passed between data disclosure and usage. This extended scenario leads to a new framework for inter-temporal privacy metrics. The common dilemma of all privacy metrics is their dependence on the information available to the data controller. The same information may or may not be available to the individual and, as a consequence, the individual may be misguided in his decisions due to his limited access to the data controller’s information when using privacy metrics. The goal of this thesis is thus not only the specification of new privacy metrics, but also the contribution of ideas for mitigating this dilemma. However a solution will rather be a combination of technological, economical and legal means than a purely technical solution.
  •  
4.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.2: First report on frameworks/models matching Department 6 needs
  • 2005
  • Reports (peer-reviewed)abstract
    • During the first phase of NEWCOM the focus areas of Department 6 were identified and refined. A number of relevant knowledge gaps were identified for the areas transport protocols, architectures and cross-layer aspects, and modelling. In this deliverable we describe a first set of frameworks/models to support research integration within the Department. The integration approach and the defined models/frameworks are described for each one of the selected knowledge gaps. The deliverable also includes a report on tools, software libraries and traces that can be shared between the partners
  •  
5.
  • Hasselström, Nicklas, et al. (author)
  • The Design, Implementation, and Performance Evaluation of Secure Socket SCTP 2.0
  • 2015
  • Reports (other academic/artistic)abstract
    • The Stream Control Transmission Protocol (SCTP) is acomparatively new transport protocol that presents some advanced features compared to other standardized transport protocols. However, there are currently no standardized end-to-end security solutions suited for SCTP. One proposal for end-to-end encryption is the Secure Socket SCTP (S2-SCTP) protocol, developed by researchers at Karlstad University.  The security solution for SCTP described in this report uses key agreement for obtaining keys to be able to provide data confidentiality by encryption. The protocol is based on the S2-SCTP protocol, with smaller changes, and an overlaying management protocol has been designed and implemented. The management protocolis used to enable encryption and TLS authentication, to give a secure communication library over existing Berkeley Sockets. The performance evaluation of S2-SCTP compared to the already standardized end-to-endsecurity solutions, i.e., TLS over SCTP and DTLS over SCTP, shows that S2-SCTP achieves a higher throughput while still maintaining most of the advantages of SCTP.
  •  
6.
  • Hedbom, Hans, et al. (author)
  • A Comparison of the Security of Windows NT and UNIX
  • 1998
  • Conference paper (peer-reviewed)abstract
    • This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than standard UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the real level of security between these systems
  •  
7.
  • Hedbom, Hans, et al. (author)
  • Analysis of the Security of Windows NT
  • 1998
  • Reports (peer-reviewed)abstract
    • This paper presents an analysis of the security in Windows NT 4.0, working in both stand-alone and networking mode. The objective of the work was to find out how secure this operating system actually is. A technical overview of the system, and in particular its security features is given. The system security was analyzed and practical intrusion attempts were made in order to verify vulnerabilities or to find new ones. All vulnerabilities are described in detail and classified according to a classification scheme. A comparison to commonly known UNIX weaknesses was made. It revealed generic similarities between the two systems to a surprisingly high degree. Finally a number of recommendations are given. The paper concludes that there are ample opportunities to improve the security of Windows NT. We have reason to believe that it is probably not higher than that of UNIX
  •  
8.
  •  
9.
  • Adestam, Johan, 1982- (author)
  • Den dokumentvillkorade garantin
  • 2014
  • Doctoral thesis (other academic/artistic)abstract
    • Den dokumentvillkorade garantin, som i praktiken vanligen betecknas som självständig, känneteck-nas av att villkoren i utfästelsen väsentligen endast innefattar villkor som refererar till att vissa angivna dokument presenteras för garanten. Dokumentvillkorade garantier förekommer vanligtvis i avtalsstrukturer som involverar ett flertal olika avtal och parter. De typer av avtal som omfattas av sådana avtalsstrukturer ger upphov till speciella rättsliga frågor. Avhandlingen belyser ett antal sådana frågor ur ett svenskt perspektiv, genom att beskriva rättsnormers utformning och tillämpning på olika typer av fall. Särskild vikt läggs vid att upprätthålla ett språkbruk som möjliggör att detta sker på ett motsägelsefritt och rättvisande sätt.En fråga av grundläggande betydelse är hur garantier kan klassificeras på ett sätt som bidrar till att besvara nyss nämnda typ av frågor. En sådan klassifikation, baserad på garantiers innehåll, klargör vad som skiljer den dokumentvillkorade garantin från andra typer av garantier. När det gäller den rättsliga relationen mellan parterna till ett avtal i vilket det föreskrivs att den ena parten, gäldenären, ska låta ombesörja att det ställs ut en garanti till motparten, berörs i synnerhet frågan under vilka omständigheter motparten är fri att begära fullgörelse av garantin och frågan under vilka omständigheter det uppkommer en återkravsrätt för gäldenären gentemot motparten (beneficienten). I fråga om den rättsliga relationen mellan garanten och beneficienten behandlas särskilt frågorna hur man genom tolkning avgör om en garanti är dokumentvillkorad eller inte, hur dokumentvillkoren i en dokumentvillkorad garanti ska tolkas och i vilken mån det finns speciella rättsnormer tillämpliga på dokumentvillkorade garantier. Ytterligare en fråga rör tillämpningen av den tvingande regeln om rättsmissbruk, enligt vilken beneficienten saknar rätt till fullgörelse av garanten om det föreligger rättsmissbruk. Såvitt avser den rättsliga relationen mellan uppdragsgivare och uppdragstagare i uppdrag som relaterar till utfärdandet av en dokumentvillkorad garanti berörs i synnerhet frågan under vilka omständigheter en uppdragstagare har regressrätt gentemot sin uppdragsgivare. En fråga av allmän betydelse är vad som i olika avseenden krävs för att intresset av att uppdragstagare till sådana uppdrag inte ska ha incitament att undersöka svårbedömda omständigheter ska tillgodoses. 
  •  
10.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • A Multipath TCP Proxy
  • 2015
  • Conference paper (peer-reviewed)abstract
    • Multipath TCP (MPTCP) is an extension to traditionalTCP that enables a number of performance advantages,which were not offered before. While the protocol specificationis close to being finalized, there still remain some concernsregarding deployability and security. This paper describes theon going work to develop a solution that will facilitate thedeployment of MPTCP. The solution will not only allow non-MPTCP capable end-hosts to benefit from MPTCP performancegains, but also help ease the network security concerns that manymiddleboxes face due to the possibility of data stream beingfragmented across multiple subflows.
  •  
11.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Automated Testing of IDS Rules
  • 2015
  • In: Software Testing, Verification and Validation Workshops (ICSTW), 2015 IEEE Eighth International Conference on. - : IEEE. - 9781479918850
  • Conference paper (peer-reviewed)abstract
    • As technology becomes ubiquitous, new vulnerabilities are being discovered at a rapid rate. Security experts continuously find ways to detect attempts to exploit those vulnerabilities. The outcome is an extremely large and complex rule set used by Intrusion Detection Systems (IDSs) to detect and prevent the vulnerabilities. The rule sets have become so large that it seems infeasible to verify their precision or identify overlapping rules. This work proposes a methodology consisting of a set of tools that will make rule management easier.
  •  
12.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • IDS rule management made easy
  • 2016
  • In: Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on. - : IEEE. - 9781509020485 - 9781509020478
  • Conference paper (peer-reviewed)abstract
    • Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.
  •  
13.
  • Afzal, Zeeshan, 1991- (author)
  • Life of a Security Middlebox : Challenges with Emerging Protocols and Technologies
  • 2020
  • Doctoral thesis (other academic/artistic)abstract
    • The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. These middleboxes make many assumptions about the traffic that may not hold true any longer with the advent of new protocols such as MPTCP and technologies like end-to-end encryption.The work in this thesis focuses on security middleboxes and the challenges they face. We develop methods and solutions to help these security middleboxes continue to function correctly. In particular, we investigate the case of using MPTCP over traditional security infrastructure as well as the case of end-to-end encryption. We study how practical it is to evade a security middlebox by fragmenting and sending traffic across multiple paths using MPTCP. We then go on to propose possible solutions to detect such attacks and implement them. The potential MPTCP scenario where security middleboxes only have access to part of the traffic is also investigated and addressed. Moreover, the thesis contributes a machine learning based approach to help security middleboxes detect malware in encrypted traffic without decryption.
  •  
14.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Multipath TCP IDS Evasion and Mitigation
  • 2015
  • In: Information Security. - Cham : Springer. - 9783319233178 ; , s. 265-282
  • Conference paper (peer-reviewed)abstract
    • The existing network security infrastructure is not ready for future protocols such as Multipath TCP (MPTCP). The outcome is that middleboxes are configured to block such protocols. This paper studies the security risk that arises if future protocols are used over unaware infrastructures. In particular, the practicality and severity of cross-path fragmentation attacks utilizing MPTCP against the signature-matching capability of the Snort intrusion detection system (IDS) is investigated. Results reveal that the attack is realistic and opens the possibility to evade any signature-based IDS. To mitigate the attack, a solution is also proposed in the form of the MPTCP Linker tool. The work outlines the importance of MPTCP support in future network security middleboxes.
  •  
15.
  •  
16.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Slice Distance : An Insert-Only Levenshtein Distance with a Focus on Security Applications
  • 2018
  • In: Proceedings of NTMS 2018 Conference and Workshop. - New York : IEEE. - 9781538636626 - 9781538636633 ; , s. 1-5
  • Conference paper (peer-reviewed)abstract
    • Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.
  •  
17.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Towards Multipath TCP Aware Security Technologies
  • 2016
  • In: 2016 8th IFIP International Conference onNew Technologies, Mobility and Security (NTMS). - New York : IEEE. - 9781509029143 ; , s. 1-8
  • Conference paper (peer-reviewed)abstract
    • Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.
  •  
18.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Using Features of Encrypted Network Traffic to Detect Malware
  • 2021
  • In: 25th Nordic Conference on Secure IT Systems, NordSec 2020. - Cham : Springer Science and Business Media Deutschland GmbH. ; , s. 37-53
  • Conference paper (peer-reviewed)abstract
    • Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.
  •  
19.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Using Partial Signatures in Intrusion Detection for Multipath TCP
  • 2019
  • In: Secure IT-systems. - Cham, Switzerland : Springer. ; , s. 71-86
  • Conference paper (peer-reviewed)abstract
    • Traditional security mechanisms such as signature basedintrusion detection systems (IDSs) attempt to find a perfect match of aset of signatures in network traffic. Such IDSs depend on the availabilityof a complete application data stream. With emerging protocols such asMultipath TCP (MPTCP), this precondition cannot be ensured, result-ing in false negatives and IDS evasion. On the other hand, if approximatesignature matching is used instead in an IDS, a potentially high numberof false positives make the detection impractical. In this paper, we showthat, by using a specially tailored partial signature matcher and knowl-edge about MPTCP semantics, the Snort3 IDS can be empowered withpartial signature detection. Additionally, we uncover the type of Snort3rules suitable for the task of partial matching. Experimental results withthese rules show a low false positive rate for benign traffic and highdetection coverage for attack traffic.
  •  
20.
  • Agustí, Ramón, et al. (author)
  • NEWCOM DR7.2: First report on common framework/models and activities in Department 7
  • 2005
  • Reports (peer-reviewed)abstract
    • This deliverable provides a description of the framework identified for the collaborative activities between different partners in the context of NEWCOM department 7 on QoS provision in heterogeneous wireless networks. The considered models, assumptions and expected results are pointed out for each activity. The deliverable also includes a report on the means to achieve the integration between the different partners
  •  
21.
  • Agustí, Ramón, et al. (author)
  • NEWCOM DR7.4: Final Report on the activities carried out in Department 7
  • 2007
  • Reports (peer-reviewed)abstract
    • This deliverable constitutes the final report of all the activities that carried out in the framework of the NEWCOM department 7. It contains a description of the main technical achievements for each one of the activities in which the department has been organised togehter with the list of indicators reflecting the degree of integration that has been achieved among the different partners
  •  
22.
  • Andersson, Carin, et al. (author)
  • Survey and Analysis of Project Management Competence within Research Projects at Karlstad University
  • 2007
  • Other publication (pop. science, debate, etc.)abstract
    • Research at universities is today often conducted as projects. This is especially true in the engineering, natural science, medicine, and social science disciplines. Research projects are typically carried out by different categories of employers, such as professors, associate professors, assistant professors, and PhD students. These projects are typically managed by the person that applied for the project money, or the person that is the most experienced researcher at the department, which is often a professor or associate professor. From such leading persons, miracles are expected. Except acting as project managers, they are also engaged in many other parallel activities, e.g., supervision of PhD students, undergraduate and graduate education, conference organization and administration, project application writing, and representing the department internally as well as externally.In this report, a survey of project management competence within research projects at Karlstad University is presented. Empirical data have been gathered through two questionnaires and six complementary interviews. Professors and associate professors as well as PhD students have participated in the study. The survey shows that the active project managers have learned to lead projects based on experience and very few project managers have a formal leadership education. This implies that long established project management methods and tools are seldom used.Based on the outcome from the survey and our own observations, four concrete activities to improve project management skills are proposed in the report. The first activity is to provide a suitable and well-balanced course in project management methods that is offered to both active and future project managers. The second activity is to establish experience networks among active project mangers at Karlstad University. The third activity is to create a mentor program for new project managers. The fourth activity is to establish a group of experienced project managers that can assist in and give support to ongoing and planned projects.
  •  
23.
  •  
24.
  • Berndsen, Marta, 1986, et al. (author)
  • Long-term outcome after surgical resection of non-high-risk gastrointestinal stromal tumours without adjuvant therapy
  • 2023
  • In: The British journal of surgery. - 1365-2168. ; 110:12, s. 1857-1862
  • Journal article (peer-reviewed)abstract
    • BACKGROUND: Gastrointestinal stromal tumour (GIST) is the most common intra-abdominal sarcoma. Risk classification systems, commonly the modified National Institutes of Health consensus criteria, identify tumour properties relating to patient outcomes. However, owing to limited long-term evidence, most guidelines recommend up to 10-year follow-up for all risk groups except very low-risk GIST. METHODS: This retrospective multicentre study included patients who had complete resection of primary, non-metastatic GIST from three Scandinavian sarcoma centres: Gothenburg (2004-2020), Stockholm (2000-2019), and Oslo (2000-2017). Medical records were reviewed for clinical details regarding diagnosis, treatment, and follow-up, and recurrence-free and disease-specific survival evaluated. RESULTS: The total cohort consisted of 1213 patients with GIST. High-risk patients and those treated with tyrosine kinase inhibitors were excluded. The remaining 649 patients were included in the present analysis: 118 with very low-, 381 with low-, and 150 with intermediate-risk GISTs. Five-year recurrence-free survival rates were 100, 98.5, and 100 per cent for the intermediate-, low-, and very low-risk groups respectively (P = 0.246). Disease-specific survival rates 10 years after surgery were 100, 98.4, and 100 per cent for the intermediate-, low-, and very low-risk groups respectively (P = 0.262). CONCLUSION: Patients with completely resected non-high-risk GISTs have an excellent long-term outcome, irrespective of risk group. Follow-up programmes to detect disease recurrences in these patients are probably not indicated.
  •  
25.
  •  
26.
  •  
27.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.1: Report on the knowledge gaps to be filled and the action plan
  • 2004
  • Reports (peer-reviewed)abstract
    • The EU FP6 network of excellence in wireless communication, Newcom, is a large network that covers most areas of wireless communication. The research work within Newcom is organized into a number of departments and projects where Department 6 addresses Protocols and Architectures, and Traffic Modelling for (Reconfigurable/ Adaptive) Wireless Networks. The scope of Department 6 is quite broad making it important to further identify and refine the focus areas of the department. This document summarizes research areas that fall within the competence of and are of interest for the members of Department 6 and also describes the background of the partners within these areas. A set of knowledge gaps that will be addressed within the department are identified. A number of integrating activities that can be used to coordinate the efforts of the partners are described and an action plan for the continued work within the department is provided
  •  
28.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.4: Proceedings of the Newcom Department 6 Second Technical Workshop
  • 2005
  • Reports (peer-reviewed)abstract
    • The Second Newcom Department 6 Technical Workshop was organized in Barcelona on September 16-17, 2005. The workshop program contained 6 presentations and provided a good overview of ongoing research integration activities within the department. All of the three areas of the department, transport protocols, architectures and cross-layer aspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:- Westwood-SCTP: A Transport Protocol for Traffic Balancing on Multihomed Hosts- Transport Layer Handover using SCTP- The Optimization of Transport Protocol over Ad-Hoc Networks- Wireless Networks Emulation- An Analytical Model of Rate-Controlled MPEG Video Sources in a UMTS Network- An Analytical Model of a Rate-controlled MPEG-4 Video Source Capturing both Intra-frame and Inter-frame CorrelationAs an option, a supporting paper for the presentation could also be supplied by the authors. Thedeliverable contains supporting articles for two of the presentations
  •  
29.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.6: Second report on common frameworks/models matching Department 6
  • 2006
  • Reports (peer-reviewed)abstract
    • Work within Department 6 of NEWCOM is organized into the areas transport protocols, architectures and cross-layer aspects, and modelling. In this deliverable we provide a second report on the frameworks/models used to support research integration within the Department. The integration approach and the defined models/frameworks are described for each one of the three areas of the department. The deliverable also includes an updated report on tools, software libraries and traces that can be shared between the partners
  •  
30.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.7: Proceedings of the Newcom Department 6 Second Technical Workshop
  • 2006
  • Reports (peer-reviewed)abstract
    • The Third Newcom Department 6 Technical Workshop was organized in Catania, Italy, on February 2, 2006. The workshop program contained 4 presentations and contained reports on ongoing integrated research activities as well as presentation intended to initiate additional joint research within the department. All of the three areas of the department, transport protocols, architectures and cross-layeraspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:- P2P-based Video transmission in wireless networks- Transport Layer Handover using SCTP- WIPEMU 4G System Emulation and Sample Results- Wireless Networks EmulationWhere available the presentation notes are also included with the presentations
  •  
31.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR6.9: Proceedings of the Newcom Department 6 Fourth Technical Workshop
  • 2006
  • Reports (peer-reviewed)abstract
    • The Fourth Newcom Department 6 Technical Workshop was organized in Toulouse, France, on September 13-14, 2006. The workshop program contained 6 presentations and contained reports on ongoing integrated research activities as well as presentation intended to initiate additional joint research activities between the partners. All of the three areas of the department, transport protocols, architectures and cross-layer aspects, and modelling were represented with presentations. This deliverable contains the presentation material from the workshop. The included presentations are:- P2P Video Transmission over Heterogeneous Wired/Wireless Networks: A Starting Point for Integrated Research- DCCP Overview and First Experiments- Estimation of the SCTP Failover Time- Improving End to End Goodput of Ad Hoc Networks with SCTP Multihoming- A Taxonomy and Survey of SCTP Research- Integrating KAUnet and SWINEWhere available the presentation notes are also included with the presentations
  •  
32.
  • Brunström, Anna, et al. (author)
  • NEWCOM DR7.1: Report on the knowledge gaps to be filled and the action plan
  • 2004
  • Reports (peer-reviewed)abstract
    • This deliverable is the starting point of the activities in the NEWCOM Department 7 QoS Provision in Wireless Networks: Mobility, Security and Radio Resource Management. It provides the view of the department in terms of the objectives of the European research on Wireless Network aspects and, after developing the framework for QoS provision in wireless networks, it identifies the knowledge gaps existing in the fields of radio resource allocation, mobility management and security issues. As a result of that, the action plan for the future activities in the department is established
  •  
33.
  • Brunström, Anna, et al. (author)
  • Proceedings of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010)
  • 2010
  • Book (peer-reviewed)abstract
    • This publication contains the Proceedings of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010) that will be held on May 2628, 2010 in Karlstad, Sweden. IWSCN 2010 brings together researchers, developers, practitioners, and users interested in the area of security and communication networks. The workshop focuses on how to design, build, and evaluate future networks that are secure, reliable, and provide high and predictable performance. The aim of the workshop is to serve as a forum for presenting current and future work, as well as to exchange research ideas in these fields.Papers containing research contributions focusing on aspects of security and communication networks were solicited for submission to IWSCN 2010. A total of 40 papers were received, representing authors from 20 different countries and 5 different continents. Each paper was reviewed by at least three members of the technical program committee. After a thorough review process, 13 papers were selected for presentation at the workshop, giving an acceptance rate of 32.5%. In addition to the technical papers, two keynote presentations on The Changing Performance Goals in Internet Video Streaming and Dependable Protocols for Wireless Sensor Networks will be provided by Carsten Griwodz from the Simula Research Laboratory AS in Norway and Levente Buttyán from Budapest University of Technology and Economics in Hungary, respectively. Furthermore, a tutorial on Penetration Testing from an Attacker Perspective will be given by Vesa Virta from the National Defence Radio Establishment in Sweden.IWSCN 2010 is organized by the Department of Computer Science at Karlstad University and is supported by the Euro-NF and Newcom++ EU Networks of Excellence, and IEEE Sweden Section. The workshop is sponsored by Compare Karlstad Foundation, Coromatic, and TeliaSonera, and we thank them for their support. We also gratefully thank all authors, members of the program committee, and the local organizing committee for contributing to the scientific quality of the workshop
  •  
34.
  • Bubenko jr, Janis, et al. (author)
  • Promote IT 2004 : Proceedings of the Fourth Conference for the Promotion of research in IT at New Universities and University Colleges in Sweden, 5-7 May, Karlstad University, The Knowledge Foundation, Part 1 and Part 2
  • 2004
  • Book (peer-reviewed)abstract
    • The Knowledge Foundation of Sweden and Karlstad University are proud to announce the fourth annual conference for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. The conference takes place at Karlstad University in Sweden, May 5-7, 2004.The conference is in the Foundation's programme for promoting research and advanced education in topics of IT at Sweden's new universities and university colleges. Almost 200 MSEK (about 22 MEUR) has been allocated, for a period of five years, in order to increase the number of IT-teachers with a PhD. degree at Sweden's new universities and university colleges.Since the start of the programme in year 2000, almost one hundred persons are actively pursuing their graduate studies and research at these new universities and colleges. These are the persons that now present their progress at this conference
  •  
35.
  • Campanello, Magnus, et al. (author)
  • Image of an adrenal mesenchymoma.
  • 2023
  • In: ANZ journal of surgery. - 1445-1433 .- 1445-2197. ; 93:10, s. 2533-2534
  • Journal article (peer-reviewed)
  •  
36.
  • Campanello, Magnus, et al. (author)
  • Linear and circular stapled gastrojejunal anastomoses in Roux-en-Y gastric bypass: stomal diameter at onset and at long-term follow-up
  • 2022
  • In: ANZ Journal of Surgery. - : Wiley. - 1445-1433 .- 1445-2197. ; 92:11, s. 2896-2900
  • Journal article (peer-reviewed)abstract
    • Background: In the laparoscopic Roux-en-Y gastric bypass procedure, the gastrojejunal stoma is constructed with either a circular (CSD) or a linear stapling device (LSD). The diameter of the stoma following stapling with the 21 mm CSD is expected to be approximately 12 mm (diameter of the anvil). Measuring the stoma diameter after linear stapling is a little more complex since the remaining opening in the linear anastomosis is closed by hand. The aim of this prospective randomized study was to follow up on changes in the diameter of gastrojejunal stomata after laparoscopic Roux-en-Y gastric bypass using either a CSD or an LSD between that at construction and at a long-term follow-up of 12–72 months later. Methods: Twenty patients were randomly assigned to gastrojejunostomy with either a 21 mm CSD or a 45 mm LSD. Directly after completion of the surgery, the diameter of the gastrojejunal stoma was measured using a Fogarty occlusion catheter and again at follow-up 12–72 months later. Results: Five patients were lost for follow-up, and 15 patients remained. The mean diameter of the CSD stomata at construction was 19.3 ± 5.3 mm (mean ± SD) and increased to 26.4 ± 6.6 mm at follow-up after a mean of 46 months (P=0.02). The corresponding figures for the LSD stomata were 26.2 ± 4.1 mm, increasing to 32.7 ± 3.0 mm also after a mean follow-up of 46 months (P=0.03). Conclusions: The mean diameter of the circular stapled gastrojejunostomy stomata at construction was 20 mm, that is, considerably larger than the 12 mm expected. After a mean of 5 years, the mean diameter had increased by 37%. The mean diameter of the linear stapled stomata increased by 25%. © 2022 Royal Australasian College of Surgeons.
  •  
37.
  • Campanello, Magnus, et al. (author)
  • Quality of life and gastric acid-suppression medication 20 years after laparoscopic fundoplication
  • 2020
  • In: ANZ Journal of Surgery. - : Wiley. - 1445-1433 .- 1445-2197. ; 90:1-2, s. 76-80
  • Journal article (peer-reviewed)abstract
    • Background: Laparoscopic fundoplication is an effective treatment for gastro-oesophageal reflux disease (GERD). We aimed to assess quality of life (QoL), long-term residual symptoms, patient satisfaction and use of acid-suppression medication at 5, 10 and 20 years after surgery. Methods: We identified a cohort of 100 patients who underwent laparoscopic fundoplication between 1993 and 1998. The validated QoL questionnaires Short Form health survey (SF-36), and Quality-of-Life in Reflux and Dyspepsia (QOLRAD), as well as a specific questionnaire regarding post-fundoplication symptoms, were sent to the patients at 5, 10 and 20 years after surgery. Furthermore, patients who reported using the acid-suppression medication after 20 years were interviewed by telephone regarding their reason for taking it. Results: Eighty-eight percent of the patients responded at 5 and 10 years post-surgery. Twenty years following fundoplication, 68 (84% of those still alive) patients completed the questionnaires. The patients had equivalent health-related QoL scores in both the QOLRAD and SF-36 questionnaires after 10 and 20 years, and those scores were in line with a Swedish age-matched population. After 20 years, 87% were satisfied with the results, and 84% of the patients would recommend reflux surgery to a relative or a friend. At the telephone interview, 32% (22/68) confirmed using acid-suppression medication, but only half (11/68) used it because of reflux symptoms. Conclusion: The long-term, satisfying outcomes in GERD symptoms and QoL 5 and 10 years after surgery were maintained at a 20-year follow-up. Half of the patients used acid-suppression medication for reasons other than GERD symptoms. © 2019 Royal Australasian College of Surgeons
  •  
38.
  •  
39.
  • Dahlberg, Rasmus (author)
  • On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users
  • 2023
  • Doctoral thesis (other academic/artistic)abstract
    • Certificate Transparency is an ecosystem of logs, monitors, and auditors that hold certificate authorities accountable while issuing certificates. We show how the amount of trust that TLS clients and domain owners need to place in Certificate Transparency can be reduced, both in the context of existing gradual deployments and the largely unexplored area of Tor. Our contributions include improved third-party monitoring, a gossip protocol plugging into Certificate Transparency over DNS, an incrementally deployable gossip-audit model tailored for Tor Browser, and using certificates with onion addresses. The methods used range from proof sketches to Internet measurements and prototype evaluations. An essential part of our evaluation in Tor is to assess how the protocols used during website visits—such as requesting an inclusion proof from a Certificate Transparency log—affect unlinkability between senders and receivers. We find that most false positives in website fingerprinting attacks can be eliminated for all but the most frequently visited sites. This is because the destination anonymity set can be reduced due to how Internet protocols work: communication is observable and often involves third-party interactions. Some of the used protocols can further be subject to side-channel analysis. For example, we show that remote (timeless) timing attacks against Tor’s DNS cache reliably reveal the timing of past exit traffic. The severity and practicality of our extension to website fingerprinting pose threats to the anonymity provided by Tor. We conclude that access to a so-called website oracle should be an assumed attacker capability when evaluating website fingerprinting defenses.
  •  
40.
  • Dahlberg, Rasmus, et al. (author)
  • Standardized Syslog Processing : Revisiting Secure Reliable Data Transfer and Message Compression
  • 2016
  • Reports (other academic/artistic)abstract
    • Today's computer logs are like smoking guns and treasure maps in case of suspicious system activities: they document intrusions, and log crucial information such as failed system updates and crashed services. An adversary thus has a clear motive to observe, alter, and delete log entries, considering that she could (i) start by using the log's content to identify new security vulnerabilities, and (ii) exploit them without ever being detected. With this in mind we consider syslog standards and open source projects that safeguard events during the storage and transit phases, and examine how data compression effects security. We conclude that there are syslog standards in place that satisfy security on a hop-by-hop basis, that there are no such standards for secure storage, and that message compression is not recommended during transit.
  •  
41.
  • Dalin, Frida, 1984-, et al. (author)
  • Clinical and immunological characteristics of Autoimmune Addison's disease : a nationwide Swedish multicenter study
  • 2017
  • In: Journal of Clinical Endocrinology and Metabolism. - : Oxford University Press. - 0021-972X .- 1945-7197. ; 102:2, s. 379-389
  • Journal article (peer-reviewed)abstract
    • CONTEXT: Studies on clinical and immunological features of Autoimmune Addison's disease (AAD) are needed to understand the disease burden and increased mortality.OBJECTIVE: To provide upgraded data on autoimmune comorbidities, replacement therapy, autoantibody profiles and cardiovascular risk factors.DESIGN, SETTING AND PARTICIPANTS: Cross sectional, population-based study. 660 AAD patients were included utilizing the Swedish Addison Registry (SAR) 2008-2014. When analyzing cardiovascular risk factors, 3,594 individuals from the population-based survey in Northern Sweden, MONICA (MONItoring of Trends and Determinants of CArdiovascular Disease), served as controls.MAIN OUTCOME MEASURE: Prevalence of autoimmune comorbidities and cardiovascular risk factors. Autoantibodies against 13 autoantigens were determined.RESULTS: Sixty percent of the SAR cohort consisted of females. Mean age at diagnosis was significantly higher for females than for males (36.8 vs. 31.1 years). The proportion of 21-hydroxylase autoantibody positive patients was 83% and 62% of patients had one or more associated autoimmune diseases, more frequently coexisting in females (p<0.0001). AAD patients had lower BMI (p<0.0001) and prevalence of hypertension (p=0.027) compared with controls. Conventional hydrocortisone tablets were used by 89% of patients; with the mean dose 28.1±8.5 mg/day. The mean hydrocortisone equivalent dose normalized to body surface was 14.8±4.4 mg/m(2)/day. Higher hydrocortisone equivalent dose was associated with higher incidence of hypertension (p=0.046).CONCLUSIONS: Careful monitoring of AAD patients is warranted to detect associated autoimmune diseases. Contemporary Swedish AAD patients do not have increased prevalence of overweight, hypertension, T2DM or hyperlipidemia. However, high glucocorticoid replacement doses may be a risk factor for hypertension.
  •  
42.
  • E Andersson, Carin, et al. (author)
  • Kartläggning och analys av projektledarkompetens i forskningsprojekt vid Karlstads universitet
  • 2007
  • Reports (peer-reviewed)abstract
    • Idag bedrivs en stor del av forskningen vid högskolor och universitet i projektform. Detta gäller inte minst inom teknik, naturvetenskap och medicin, men numer också inom samhällsvetenskap.Det är vanligt att olika personalkategorier så som exempelvis professorer,docenter, och doktorander ingår i projekten. Projektledaren är oftast den som har ansökt om projektmedlen, eller den person som är mest vetenskapligt meriterad vid avdelningen, vilket ofta är en professor eller docent med lång erfarenhet. Av de här personerna förväntar sig organisationen ofta underverk. De ska medverka i alla möjliga typer av aktiviteter, som exempelvis handledning av doktorander,undervisning, medverkande vid och organiserande av konferenser,ansökan om medel för nya projekt och vara avdelningens ansikte utåt. Dessutom ska de också agera projektledare för en eller flera parallella projekt.I den här uppsatsen redovisar vi först en kartläggning av projektledarkompetens hos projektledare i forskningsprojekt vid Karlstads universitet. Kartläggningen har gjorts med stöd av två enkätundersökningar och sex stycken kompletterande intervjuer. Såväl professorer och docenter som doktorander har medverkat i studien. Kartläggningen visar klart och tydligt att de flesta projektledarna leder projekten baserat på tidigare erfarenheter och merparten saknar ledarskapsutbildning. Detta innebär att beprövade projektledningsmetoder och tekniker sällan används.Baserat på resultat från enkätundersökningarna, intervjuerna och deltagande observationer presenterar vi dessutom fyra konkreta förbättringsåtgärder för forskningsprojekt vid Karlstads universitet. Åtgärderna tror vi kan effektivisera forskningsprojekten och därmed medföra en besparing för Karlstads universitet. Den första åtgärden är att utveckla en kurs i projektledningsmetodik, som sedan erbjuds till alla projektledare vid Karlstads universitet.Den andra åtgärden är att bygga upp en eller flera erfarenhetsnätverk bland aktiva projektledare. Den tredje åtgärden är att skapa ett mentorsprogram för stöd åt nya projektledare. Den fjärde och sista åtgärden är att etablera en grupp med erfarna projektledare som kan ge stöd åt andra projektledare.
  •  
43.
  • Elgebrant, Emil, 1969- (author)
  • Ägande & värde av utsläppsrätter och andra liknande handelsobjekt : en sakrättslig, redovisningsrättslig och skatterättslig studie
  • 2012
  • Doctoral thesis (other academic/artistic)abstract
    • The objective of the dissertation is to examine national legal issues arising with the enactment of emissions allowances, electricity certificates and other similar trading objects. Several of the issues identified in this dissertation have their origins in the same problems that arose with the enactment of the legislation regarding promissory notes in the 1910’s and the legislation concerning the digitalization/dematerialization of financial instruments in the 1980’s. Simply stated, the fundamental problem is what has the legislator created? The dissertation’s interdisciplinary character has facilitated an approximation of issues that have arisen, which would not have been possible through studies solely of individual legal areas. This method has proven itself to be particularly relevant as new legal figures are introduced in an existing legal system. A starting point for any study of the trading object is that it is an independent legal object, separate from any authorization to emit, etc. This means that the trading object does not consist of any right to act in a certain manner (emit, etc.). A legal classification of the trading object has shown itself to be difficult to achieve within all of the studied legal areas. The private law conceptual apparatus and its categorizations of property have been debated in this dissertation from different perspectives. How the economic value of the trading object is treated in a legal context has shown itself to be dependent upon which legal context is intended, and how the trading object is classified in this context. The trading object’s private law character and its ability to be owned has certain significance for the accounting, income, and VAT law classifications of the trading object. The legal classification of the trading objects raises, to a great extent, a general and fundamental classification problem
  •  
44.
  •  
45.
  • Faigl, Zoltán, et al. (author)
  • Experimental Evaluation of the Performance Costs of Different IKEv2 Authentication Methods
  • 2008
  • Conference paper (peer-reviewed)abstract
    • This paper presents an experimental evaluation of the costs of different IKEv2 authentication methods. The studied methods are pre-shared keys (PSK), extensible authentication protocol (EAP) using MD5 and TLS, which are typically referred to as EAP-MD5 and EAP-TLS, respectively. For the EAP-based methods RADIUS is used as AAA server. Different lengths of certification chains are studied in the EAP-TLS case. The paper first presents a brief overview of the considered authentication methods. Then, an experimental comparison of the costs for computations and messages transfers associated with the authentication methods are provided. The measurement results illustrate the practical costs involved for IKEv2 authentication, and show the performance implications of using different authentication methods. EAP-TLS is several times more demanding than both PSK and EAP-MD5. When EAP-TLS is used, the length of certificate chains also has a notable impact on performance
  •  
46.
  • Faigl, Zoltán, et al. (author)
  • IKEv2 Performance when Protecting Mobile IPv6 Signaling
  • 2007
  • Conference paper (peer-reviewed)abstract
    • This paper describes an analysis of the performance overheads caused by the processing and space requirements of the IKEv2 protocol using Diameter and EAP-TLS authentication when protecting Mobile IPv6 signaling. IKEv2 negotiation between mobile nodes, the home agent, and the AAA server in a large-scale reference scenario is considered. The analysis is based on queuing theory and focuses on the overall utilization of the home agent and the AAA server by the IKEv2 reauthentication processes as well as the total mean response time for such a process in the network
  •  
47.
  • Faigl, Zoltán, et al. (author)
  • Performance Analysis of IPsec in MIPv6 Scenarios
  • 2007
  • Conference paper (peer-reviewed)abstract
    • This paper describes an analysis of the performance overheads caused by the processing and space requirements of IPsec when protecting Mobile IPv6 (MIPv6) signaling. Signaling between the Mobile Nodes and the Home Agent (HA) in a large-scale reference scenario is considered. The analysis is based on queuing theory and focuses on the overall utilization of the HA by the MIPv6 signaling processes as well as the total mean response time for a mobility process in the network. The results can assist network designers in finding the most appropriate security configuration for their specific network and mobility scenario
  •  
48.
  • Faigl, Zoltán, et al. (author)
  • Providing Tunable Security in IEEE 802.11i Enabled Networks
  • 2006
  • Reports (other academic/artistic)abstract
    • The basic idea of QoS is to provide mechanisms that can offer different service levels, which are expressed through well-defined parameters that are specified at run-time on the basis of need. Bit rate, throughput, delay, jitter, and packet loss rate are all examples of common QoS parameters suggested for packet networks. These parameters are all aimed to express(and guarantee) a certain service level with respect to reliability and/or performance. In this report, we investigate how security can be treated as yet another QoS parameter through the use of tunable security services. The main idea with this work is to let users specify a trade-off between security and performance through the choice of available security configuratio (s). The performance metric used is latency. The concept is illustrated using the IEEE 802.11i wireless local area networking standard.
  •  
49.
  •  
50.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-50 of 163
Type of publication
conference paper (62)
journal article (27)
reports (24)
book chapter (16)
doctoral thesis (12)
licentiate thesis (10)
show more...
book (5)
other publication (3)
editorial collection (2)
editorial proceedings (1)
research review (1)
show less...
Type of content
peer-reviewed (113)
other academic/artistic (43)
pop. science, debate, etc. (7)
Author/Editor
Lindskog, Stefan (97)
Lindskog, Stefan, 19 ... (53)
Brunström, Anna (29)
Lundin, Reine, 1974- (19)
Jonsson, Erland (17)
Faigl, Zoltán (13)
show more...
Afzal, Zeeshan, 1991 ... (11)
Jonsson, Erland, 194 ... (10)
Fischer-Hübner, Simo ... (9)
Brunstrom, Anna, 196 ... (9)
Hedbom, Hans (9)
Voronkov, Artem, 199 ... (7)
Brunström, Anna, 196 ... (6)
Martucci, Leonardo, ... (6)
Garcia, Johan (6)
Fazekas, Péter (5)
Winter, Philipp (5)
Martucci, Leonardo (4)
Fischer-Hübner, Simo ... (4)
Garcia, Johan, 1970- (3)
Brunstrom, Anna (3)
Axelsson, Stefan (3)
Agustí, Ramón (3)
Oliver, Miquel (3)
Pérez-Romero, Jordi (3)
Tralli, Velio (3)
Nilsson, Bengt E, 19 ... (3)
Pulls, Tobias, 1985- (3)
Campanello, Magnus (3)
Fritsch, Lothar, 197 ... (3)
Tóth, Katalin (3)
Iwaya, Leonardo H (3)
Grinnemo, Karl-Johan ... (2)
Rajiullah, Mohammad, ... (2)
Rajiullah, Mohammad (2)
Lidén, Anders (2)
Muth, Andreas, 1974 (2)
Giglio, Daniel, 1977 (2)
Debbah, Merouane (2)
Bogdan, Michael (2)
Berndsen, Marta, 198 ... (2)
Lindskog, Stefan, pr ... (2)
Dahlberg, Rasmus (2)
Gernandt, Johan (2)
Kleineman, Jan (2)
Guillaud, Maxime (2)
Andersson, André (2)
van der Sluijs, Jess ... (2)
Ysander, L (2)
Inci, Kamuran (2)
show less...
University
Karlstad University (130)
University of Gothenburg (12)
Chalmers University of Technology (12)
Lund University (7)
Uppsala University (4)
Linköping University (4)
show more...
Karolinska Institutet (4)
Stockholm University (3)
Umeå University (2)
Örebro University (2)
RISE (2)
Royal Institute of Technology (1)
Luleå University of Technology (1)
Mid Sweden University (1)
show less...
Language
English (146)
Swedish (15)
Norwegian (2)
Research subject (UKÄ/SCB)
Natural sciences (123)
Engineering and Technology (16)
Medical and Health Sciences (12)
Social Sciences (11)
Humanities (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view