SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Brunström Anna 1967 ) srt2:(2015-2019)"

Search: WFRF:(Brunström Anna 1967 ) > (2015-2019)

  • Result 1-10 of 89
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Slice Distance : An Insert-Only Levenshtein Distance with a Focus on Security Applications
  • 2018
  • In: Proceedings of NTMS 2018 Conference and Workshop. - New York : IEEE. - 9781538636626 - 9781538636633 ; , s. 1-5
  • Conference paper (peer-reviewed)abstract
    • Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.
  •  
2.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Towards Multipath TCP Aware Security Technologies
  • 2016
  • In: 2016 8th IFIP International Conference onNew Technologies, Mobility and Security (NTMS). - New York : IEEE. - 9781509029143 ; , s. 1-8
  • Conference paper (peer-reviewed)abstract
    • Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.
  •  
3.
  • Afzal, Zeeshan, 1991-, et al. (author)
  • Using Partial Signatures in Intrusion Detection for Multipath TCP
  • 2019
  • In: Secure IT-systems. - Cham, Switzerland : Springer. ; , s. 71-86
  • Conference paper (peer-reviewed)abstract
    • Traditional security mechanisms such as signature basedintrusion detection systems (IDSs) attempt to find a perfect match of aset of signatures in network traffic. Such IDSs depend on the availabilityof a complete application data stream. With emerging protocols such asMultipath TCP (MPTCP), this precondition cannot be ensured, result-ing in false negatives and IDS evasion. On the other hand, if approximatesignature matching is used instead in an IDS, a potentially high numberof false positives make the detection impractical. In this paper, we showthat, by using a specially tailored partial signature matcher and knowl-edge about MPTCP semantics, the Snort3 IDS can be empowered withpartial signature detection. Additionally, we uncover the type of Snort3rules suitable for the task of partial matching. Experimental results withthese rules show a low false positive rate for benign traffic and highdetection coverage for attack traffic.
  •  
4.
  • Mandalari, Anna Maria, et al. (author)
  • Experience: Implications of Roaming in Europe
  • 2018
  • In: MobiCom '18. Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. - New York, USA : ACM Publications. - 9781450359030 ; , s. 179-189
  • Conference paper (peer-reviewed)abstract
    • "Roam like Home" is the initiative of the European Commission (EC) to end the levy of extra charges when roaming within the European region. As a result, people are able to use data services more freely across Europe. However, the implications roaming solutions have on performance have not been carefully examined. This paper provides an in-depth characterization of the implications of international data roaming within Europe. We build a unique roaming measurement platform using 16 different mobile networks deployed in six countries across Europe. Using this platform, we measure different aspects of international roaming in 3G and 4G networks, including mobile network configuration, performance characteristics, and content discrimination. We find that operators adopt common approaches to implementing roaming, resulting in additional latency penalties of ∼60 ms or more, depending on geographical distance. Considering content accessibility, roaming poses additional constraints that leads to only minimal deviations when accessing content in the original country. However, geographical restrictions in the visited country make the picture more complicated and less intuitive.
  •  
5.
  • Abbas, Muhammad Tahir, et al. (author)
  • Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption
  • 2019
  • In: Proceedings of Fifteenth Swedish National Computer Networking Workshop (SNCNW).
  • Conference paper (peer-reviewed)abstract
    • This paper studies the impact of tunable parametersin the NB-IoT stack on the energy consumption of a user equipment(UE), e.g., a wireless sensor. NB-IoT is designed to enablemassive machine-type communications for UE while providing abattery lifetime of up to 10 years. To save battery power, most oftime the UE is in dormant state and unreachable. Still, duringthe CONNECTED and IDLE state, correct tuning of criticalparameters, like Discontinuous reception (DRX), and extendedDiscontinuous reception (eDRX), respectively, are essential to savebattery power. Moreover, the DRX and eDRX actions relate tovarious parameters which are needed to be tuned in order toachieve a required UE battery lifetime. The objective of thispaper is to observe the influence of an appropriate tuning ofthese parameters to reduce the risk of an early battery drainage
  •  
6.
  • Abrahamsson, Henrik, et al. (author)
  • Connected Vehicles in Cellular Networks : Multi-Access Versus Single-Access Performance
  • 2018
  • In: TMA 2018 - Proceedings of the 2nd Network Traffic Measurement and Analysis Conference. - : Institute of Electrical and Electronics Engineers Inc.. - 9783903176096
  • Conference paper (peer-reviewed)abstract
    • Connected vehicles can make roads traffic safer and more efficient, but require the mobile networks to handle time-critical applications. Using the MONROE mobile broadband measurement testbed we conduct a multi-access measurement study on buses. The objective is to understand what network performance connected vehicles can expect in today's mobile networks, in terms of transaction times and availability. The goal is also to understand to what extent access to several operators in parallel can improve communication performance. In our measurement experiments we repeatedly transfer warning messages from moving buses to a stationary server. We triplicate the messages and always perform three transactions in parallel over three different cellular operators. This creates a dataset with which we can compare the operators in an objective way and with which we can study the potential for multi-access. In this paper we use the triple-access dataset to evaluate single-access selection strategies, where one operator is chosen for each transaction. We show that if we have access to three operators and for each transaction choose the operator with best access technology and best signal quality then we can significantly improve availability and transaction times compared to the individual operators. The median transaction time improves with 6% compared to the best single operator and with 61% compared to the worst single operator. The 90-percentile transaction time improves with 23% compared to the best single operator and with 65% compared to the worst single operator.
  •  
7.
  •  
8.
  • Ahlgren, Bengt, et al. (author)
  • Are MIRCC and Rate-based Congestion Control in ICN READY for Variable Link Capacity?
  • 2017
  • Conference paper (other academic/artistic)abstract
    • Information-centric networking (ICN) has been introduced as a potential future networking architecture. ICN promises an architecture that makes information independent from lo- cation, application, storage, and transportation. Still, it is not without challenges. Notably, there are several outstanding issues regarding congestion control: Since ICN is more or less oblivious to the location of information, it opens up for a single application flow to have several sources, something which blurs the notion of transport flows, and makes it very difficult to employ traditional end-to-end congestion control schemes in these networks. Instead, ICN networks often make use of hop-by-hop congestion control schemes. How- ever, these schemes are also tainted with problems, e.g., several of the proposed ICN congestion controls assume fixed link capacities that are known beforehand. Since this seldom is the case, this paper evaluates the consequences in terms of latency, throughput, and link usage, variable link capacities have on a hop-by-hop congestion control scheme, such as the one employed by the Multipath-aware ICN Rate-based Congestion Control (MIRCC). The evaluation was carried out in the OMNeT++ simulator, and demonstrates how seemingly small variations in link capacity significantly deterio- rate both latency and throughput, and often result in inefficient network link usage. 
  •  
9.
  • Ahlgren, Bengt, et al. (author)
  • ICN congestion control for wireless links
  • 2018
  • In: IEEE WCNC 2018 Conference Proceedings. - New York : IEEE.
  • Conference paper (peer-reviewed)abstract
    • Information-centric networking (ICN) with its design around named-based forwarding and in-network caching holds great promises to become a key architecture for the future Internet. Many proposed ICN hop-by-hop congestion control schemes assume a fixed and known link capacity, which rarely - if ever - holds true for wireless links. Firstly, we demonstrate that although these congestion control schemes are able to fairly well utilise the available wireless link capacity, they greatly fail to keep the delay low. In fact, they essentially offer the same delay as in the case with no hop-by-hop, only end-to-end, congestion control. Secondly, we show that by complementing these schemes with an easy-to-implement, packet-train capacity estimator, we reduce the delay to a level significantly lower than what is obtained with only end-to-end congestion control, while still being able to keep the link utilisation at a high level.
  •  
10.
  • Ahlgren, Bengt, et al. (author)
  • Latency-aware Multipath Scheduling inInformation-centric Networks
  • 2019
  • In: Proceedings of the Fifteenth Swedish National Computer Networking Workshop (SNCNW), Luleå, Sweden. 4-5 June 2019..
  • Conference paper (peer-reviewed)abstract
    • We present the latency-aware multipath schedulerZQTRTT that takes advantage of the multipath opportunities ininformation-centric networking. The goal of the scheduler is touse the (single) lowest latency path for transaction-oriented flows,and use multiple paths for bulk data flows. A new estimatorcalled zero queue time ratio is used for scheduling over multiplepaths. The objective is to distribute the flow over the paths sothat the zero queue time ratio is equal on the paths, that is,so that each path is ‘pushed’ equally hard by the flow withoutcreating unwanted queueing. We make an initial evaluation usingsimulation that shows that the scheduler meets our objectives.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 89
Type of publication
conference paper (64)
journal article (10)
reports (8)
book chapter (3)
doctoral thesis (2)
licentiate thesis (2)
show more...
show less...
Type of content
peer-reviewed (80)
other academic/artistic (9)
Author/Editor
Brunström, Anna, 196 ... (88)
Grinnemo, Karl-Johan ... (44)
Hurtig, Per, 1980- (26)
Alfredsson, Stefan, ... (17)
Fairhurst, Gorry (16)
Ros, David (13)
show more...
Taheri, Javid (11)
Garcia, Johan, 1970- (10)
Lutu, Andra (10)
Bozakov, Zdravko (10)
Welzl, Michael (10)
Rajiullah, Mohammad, ... (9)
Alay, Özgü (9)
Mellia, Marco (9)
Tüxen, Michael (9)
Khademi, Naeem (9)
Mancuso, Vincenzo (8)
Arvidsson, Åke (8)
Mangiante, Simone (8)
Jones, Tom (8)
Weinrank, Felix (8)
Liberal, Fidel (7)
Ahlgren, Bengt (6)
Karlsson, Jonas, 197 ... (6)
Atxutegi, Eneko (6)
Damjanovic, Dragana (6)
Nguyen, Van-Giang, 1 ... (6)
Abrahamsson, Henrik (5)
Peón-Quirós, Miguel (5)
Hirsch, Thomas (5)
Hayes, David (5)
Oljira, Dejene Boru (5)
Høiland-Jørgensen, T ... (5)
Eklund, Johan, 1966- (4)
Evensen, Kristian (4)
Ajmone Marsan, Marco (4)
Fosselie Hansen, Aud ... (4)
Haile, Habtegebreil ... (4)
Alay, Ozgu (4)
Kassler, Andreas, 19 ... (3)
Afzal, Zeeshan, 1991 ... (3)
Lindskog, Stefan, 19 ... (3)
Hansen, Audun (3)
Safari Khatouni, Ali (3)
Petlund, Andreas (3)
Santos, Ricardo, 199 ... (3)
Riktor Evensen, Kris ... (3)
Papastergiou, Giorgo ... (3)
Fida, Mah-Rukh (3)
Rüngeler, Irene (3)
show less...
University
Karlstad University (89)
RISE (6)
Kristianstad University College (5)
Royal Institute of Technology (3)
Mälardalen University (1)
Language
English (89)
Research subject (UKÄ/SCB)
Engineering and Technology (59)
Natural sciences (51)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view