SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) ;pers:(Brunström Anna)"

Sökning: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) > Brunström Anna

  • Resultat 1-10 av 208
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Papastergiou, Giorgos, et al. (författare)
  • De-Ossifying the Internet Transport Layer: A Survey and Future Perspectives
  • 2017
  • Ingår i: IEEE Communications Surveys and Tutorials. - : IEEE. - 1553-877X. ; 19:1, s. 619-639
  • Tidskriftsartikel (refereegranskat)abstract
    • It is widely recognized that the Internet transport layer has become ossified, where further evolution has become hard or even impossible. This is a direct consequence of the ubiquitous deployment of middleboxes that hamper the deployment of new transports, aggravated further by the limited flexibility of the application programming interface (API) typically presented to applications. To tackle this problem, a wide range of solutions have been proposed in the literature, each aiming to address a particular aspect. Yet, no single proposal has emerged that is able to enable evolution of the transport layer. In this paper, after an overview of the main issues and reasons for transport-layer ossification, we survey proposed solutions and discuss their potential and limitations. The survey is divided into five parts, each covering a set of point solutions for a different facet of the problem space: (1) designing middlebox-proof transports; (2) signaling for facilitating middlebox traversal; (3) enhancing the API between the applications and the transport layer; (4) discovering and exploiting end-to-end capabilities; and (5) enabling user-space protocol stacks. Based on this analysis, we then identify further development needs toward an overall solution. We argue that the development of a comprehensive transport layer framework, able to facilitate the integration and cooperation of specialized solutions in an application-independent and flexible way, is a necessary step toward making the Internet transport architecture truly evolvable. To this end, we identify the requirements for such a framework and provide insights for its development
  •  
2.
  • Usman, Muhammad, et al. (författare)
  • A Survey on Observability of Distributed Edge & Container-based Microservices
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 86904-86919
  • Tidskriftsartikel (refereegranskat)abstract
    • Edge computing is proposed as a technical enabler for meeting emerging network technologies (such as 5G and Industrial Internet of Things), stringent application requirements and key performance indicators (KPIs). It aims to alleviate the problems associated with centralized cloud computing systems by placing computational resources to the network’s edge, closer to the users. However, the complexity of distributed edge infrastructures grows when hosting containerized workloads as microservices, resulting in hard to detect and troubleshoot outages on critical use cases such as industrial automation processes. Observability aims to support operators in managing and operating complex distributed infrastructures and microservices architectures by instrumenting end-to-end runtime performance. To the best of our knowledge, no survey article has been recently proposed for distributed edge and containerized microservices observability. Thus, this article surveys and classifies state-of-the-art solutions from various communities. Besides surveying state-of-the-art, this article also discusses the observability concept, requirements, and design considerations. Finally, we discuss open research issues as well as future research directions that will inspire additional research in this area. 
  •  
3.
  • Afzal, Zeeshan, 1991-, et al. (författare)
  • Using Features of Encrypted Network Traffic to Detect Malware
  • 2021
  • Ingår i: 25th Nordic Conference on Secure IT Systems, NordSec 2020. - Cham : Springer Science and Business Media Deutschland GmbH. ; , s. 37-53
  • Konferensbidrag (refereegranskat)abstract
    • Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.
  •  
4.
  • Lindskog, Stefan, et al. (författare)
  • Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy
  • 2004
  • Ingår i: Proceedings of the 4th Annual Information Security South Africa Conference. - Johannesburg, South Africa.
  • Konferensbidrag (refereegranskat)abstract
    • Security should be thought of as a tunable system attribute that allows users to request a specific protection level as a service from the system. This approach will be suitable in future networking environments with heterogeneous devices that have varying computing resources. The approach is also appropriate for multimedia applications that require tuning of the protection level to maintain performance at levels that are acceptable to users. In this paper, we investigate data protection services for network transfers that are designed to offer variable protection levels and propose a taxonomy for such services. The taxonomy provides a unified terminology for dynamic data protection services and a framework in which they can systematically be inspected, evaluated, and compared. The taxonomy is also intended to provide a basis for the development and identification of current and future user and/or application needs. It comprises four dimensions: type of protection service, protection level, protection level specification, and adaptiveness. On the basis of the taxonomy, a survey and categorization of existing dynamic data protection services for network transfers are made
  •  
5.
  • Norlund, K., et al. (författare)
  • Fairness measures for best effort traffic in wireless networks
  • 2004
  • Ingår i: 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004; Barcelona; Spain; 5 September 2004 through 8 September 2004. ; 4, s. 2953-2957
  • Konferensbidrag (refereegranskat)abstract
    • This paper proposes that fairness in wireless networks should be measured using one of the following new measures: the deterministic unfairness bound called the wireless absolute fairness bound (WAFB) or the statistical unfairness bound called the 99-percentile wireless absolute fairness bound (WAFB(99)). Compared with previous fairness definitions, the new fairness measures are better suited for measuring fairness of scheduling disciplines that exploit multiuser diversity.A new scheduling discipline called opportunistic proportional fair scheduling is defined. Numerical results show that the new scheduling discipline has slightly higher throughput and slightly better fairness than proportional fair scheduling.
  •  
6.
  •  
7.
  •  
8.
  • Alay, Özgü, et al. (författare)
  • Experience : An open platform for experimentation with commercial mobile broadband networks
  • 2017
  • Ingår i: MobiCom '17 Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. - New York : Association for Computing Machinery (ACM). - 9781450349161 ; , s. 70-78
  • Konferensbidrag (refereegranskat)abstract
    • Open experimentation with operational Mobile Broadband (MBB) networks in the wild is currently a fundamental requirement of the research community in its endeavor to address the need of innovative solutions for mobile communications. Even more, there is a strong need for objective data about stability and performance of MBB (e.g., 3G/4G) networks, and for tools that rigorously and scientifically assess their status. In this paper, we introduce the MONROE measurement platform: an open access and flexible hardware-based platform for measurements and custom experimentation on operational MBB networks. The MONROE platform enables accurate, realistic and meaningful assessment of the performance and reliability of 11 MBB networks in Europe. We report on our experience designing, implementing and testing the solution we propose for the platform. We detail the challenges we overcame while building and testing the MONROE testbed and argue our design and implementation choices accordingly. We describe and exemplify the capabilities of the platform and the wide variety of experiments that external users already perform using the system
  •  
9.
  • Bozakov, Zdravko, et al. (författare)
  • A NEAT framework for enhanced end-host integration in SDN environments
  • 2017
  • Ingår i: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). - : IEEE. - 9781538632857
  • Konferensbidrag (refereegranskat)abstract
    • SDN aims to facilitate the management of increasingly complex, dynamic network environments and optimize the use of the resources available therein with minimal operator intervention. To this end, SDN controllers maintain a global view of the network topology and its state. However, the extraction of information about network flows and other network metrics remains a non-trivial challenge. Network applications exhibit a wide range of properties, posing diverse, often conflicting, demands towards the network. As these requirements are typically not known, controllers must rely on error-prone heuristics to extract them. In this work, we develop a framework which allows applications deployed in an SDN environment to explicitly express their requirements to the network. Conversely, it allows network controllers to deploy policies on end-hosts and to supply applications with information about network paths, salient servers and other relevant metrics. The proposed approach opens the door for fine grained, application-aware resource optimization strategies in SDNs
  •  
10.
  • Jalili, Leilia, et al. (författare)
  • Efficient traffic offloading for seamless connectivity in 5G networks onboard high speed trains
  • 2017
  • Ingår i: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. - : IEEE. - 9781538635315 ; , s. 1-6
  • Konferensbidrag (refereegranskat)abstract
    • Seamless wireless connectivity in high mobility scenarios (≥ 300 km/h), is one of the fundamental key requirements for the future 5G networks. High speed train (HST) is one of the preferred mid-range transportation systems, and highlights the challenges of providing wireless connectivity in high mobility scenarios for the 5G networks. Advanced version of Long Term Evolution (LTE-A) from the Third Generation Partnership Project (3GPP) with peak data rate up to 100 Mbps in high mobility scenarios paved the road toward high quality and cost effective onboard Internet in HSTs. However, frequent handovers (HO) of large number of onboard users increase the service interruptions that in turn inevitably decrease the experienced quality of service (QoS). In this paper, according to the two-tier architecture of the HST wireless connectivity, we propose a novel and practically viable onboard traffic offloading mechanism among the HST carriages that effectively mitigates the service interruptions caused by frequent HOs of massive number of onboard users. The proposed architecture does not imply any change on the LTE network standardization. Conclusions are supported by numerical results for realistic LTE parameters and current HST settings.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 208
Typ av publikation
konferensbidrag (135)
tidskriftsartikel (27)
rapport (17)
doktorsavhandling (11)
bokkapitel (6)
licentiatavhandling (6)
visa fler...
bok (3)
annan publikation (3)
visa färre...
Typ av innehåll
refereegranskat (175)
övrigt vetenskapligt/konstnärligt (31)
populärvet., debatt m.m. (2)
Författare/redaktör
Brunström, Anna, 196 ... (87)
Lindskog, Stefan (29)
Garcia, Johan (27)
Grinnemo, Karl-Johan ... (22)
Alfredsson, Stefan, ... (16)
visa fler...
Hurtig, Per, 1980- (16)
Garcia, Johan, 1970- (12)
Taheri, Javid (11)
Hurtig, Per (11)
Blom, Martin (11)
Nordby, Eivind J (11)
Faigl, Zoltán (11)
Rajiullah, Mohammad, ... (10)
Ottosson Gadd, Tony, ... (10)
Kassler, Andreas, 19 ... (9)
Alay, Ozgu (9)
Alay, Özgü (8)
Lutu, Andra (8)
Mellia, Marco (7)
Asplund, Katarina (7)
Ferlin, Simone (7)
Caso, Giuseppe (6)
Ottosson, T (6)
Lindskog, Stefan, 19 ... (6)
Ahlén, Anders (6)
Svensson, Arne, 1955 (6)
Sternad, Mikael, 195 ... (6)
Mancuso, Vincenzo (6)
Karlsson, Jonas, 197 ... (6)
Oljira, Dejene Boru (6)
Wennström (Klockar), ... (6)
Eklund, Johan, 1966- (5)
Brunström, Anna, Pro ... (5)
Høiland-Jørgensen, T ... (5)
Persson, Hannes (5)
Kousias, Konstantino ... (4)
Ahlgren, Bengt (4)
Svensson, A (4)
Afzal, Zeeshan, 1991 ... (4)
Ahlén, A (4)
Sternad, M (4)
Peón-Quirós, Miguel (4)
Hirsch, Thomas (4)
Ajmone Marsan, Marco (4)
Atxutegi, Eneko (4)
Fairhurst, Gorry (4)
Pérennou, Tanguy (4)
Nguyen, Van-Giang, 1 ... (4)
Rendón, Juan (4)
visa färre...
Lärosäte
Karlstads universitet (197)
Chalmers tekniska högskola (12)
Kungliga Tekniska Högskolan (6)
Högskolan Kristianstad (5)
RISE (4)
Uppsala universitet (3)
visa fler...
Luleå tekniska universitet (1)
Mälardalens universitet (1)
visa färre...
Språk
Engelska (205)
Svenska (3)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (208)
Teknik (38)
Samhällsvetenskap (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy