Change search
Refine search result
1 - 12 of 12
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Abbas, Haider
    et al.
    Orlandi, Eugenio
    Aslam Khan, Farrukh
    Popov, Oliver
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Masood, Asif
    Security, Safety and Trust Management2017In: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises: Proceedings / [ed] Sumitra Reddy, Wojciech Cellary, Mariagrazia Fugini, IEEE Computer Society, 2017, p. 242-243Conference paper (Refereed)
    Abstract [en]

    The continuously evolving nature of today's internet outdates the existing security and safety mechanisms and therefore there is an emerging need to propose robust, powerful and reliable solutions. These advancements have a great impact on the software and system architectures, resulting in a highly dynamic smart networked environment. The systems used within these complex environments have at least two things in common, namely, the need to restrict or grant access for the required resources based on security policy to face security threats, and the need to sustain resilience of the environment in face of safety hazards. Both aspects should consider trust.

  • 2. Andersson, Ken
    et al.
    You, Ilsun
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sharma, Vishal
    Secure Computation on 4G/5G Enabled Internet-of-Things2019In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2019, article id 3978193Article in journal (Other (popular science, discussion, etc.))
    Abstract [en]

    The rapid development of Internet-of-ings (IoT) techniques in G/ G deployments is witnessing the generation of massive amounts of data which are collected, stored, processed, and presented in an easily interpretable form. Analysis of IoT data helps provide smart services such as smart homes, smart energy, smart health, and smart environments through G and G technologies. At the same time, the threat of the cyberattacks and issues with mobile internet security is becoming increasingly severe, which introduces new challenges for the security of IoT systems and applications and the privacy of individuals thereby. Protecting IoT data privacy while enabling data availability is an urgent but difficult task.

  • 3. Golatowski, Frank
    et al.
    Butzin, Björn
    Brockmann, Tim
    Schulz, Thorsten
    Kasparick, Martin
    Li, Yuhong
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Haber, Aviv
    Sakalsız, Mustafa
    Aydemir, Özer
    Challenges and Research Directions for Blockchains in the Internet of Things2019In: 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS 2019): Proceedings, IEEE, 2019Conference paper (Refereed)
    Abstract [en]

    In this paper, we analyze the state of the art in distributed ledger technologies and blockchains and investigate potential applications in the Internet of Things (IoT) domain. Afterwards, we discuss interoperability of blockchains, and their use in smart contracts, and artificial intelligence.

  • 4.
    Homem, Irvin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Advancing Automation in Digital Forensic Investigations2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. Industry standard tools are evidence-centric, automate only a few precursory tasks (E.g. Parsing and Indexing) and have limited capabilities of integration from multiple evidence sources. Furthermore, these tools are always human-driven.

    These challenges are exacerbated in the increasingly computerized and highly networked environment of today. Volumes of digital evidence to be collected and analyzed have increased, and so has the diversity of digital evidence sources involved in a typical case. This further handicaps digital forensics practitioners, labs and law enforcement agencies, causing delays in investigations and legal systems due to backlogs of cases. Improved efficiency of the digital investigation process is needed, in terms of increasing the speed and reducing the human effort expended. This study aims at achieving this time and effort reduction, by advancing automation within the digital forensic investigation process.

    Using a Design Science research approach, artifacts are designed and developed to address these practical problems. Summarily, the requirements, and architecture of a system for automating digital investigations in highly networked environments are designed. The architecture initially focuses on automation of the identification and acquisition of digital evidence, while later versions focus on full automation and self-organization of devices for all phases of the digital investigation process. Part of the remote evidence acquisition capability of this system architecture is implemented as a proof of concept. The speed and reliability of capturing digital evidence from remote mobile devices over a client-server paradigm is evaluated. A method for the uniform representation and integration of multiple diverse evidence sources for enabling automated correlation, simple reasoning and querying is developed and tested. This method is aimed at automating the analysis phase of digital investigations. Machine Learning (ML)-based triage methods are developed and tested to evaluate the feasibility and performance of using such techniques to automate the identification of priority digital evidence fragments. Models from these ML methods are evaluated in identifying network protocols within DNS tunneled network traffic. A large dataset is also created for future research in ML-based triage for identifying suspicious processes for memory forensics.

    From an ex ante evaluation, the designed system architecture enables individual devices to participate in the entire digital investigation process, contributing their processing power towards alleviating the burden on the human analyst. Experiments show that remote evidence acquisition of mobile devices over networks is feasible, however a single-TCP-connection paradigm scales poorly. A proof of concept experiment demonstrates the viability of the automated integration, correlation and reasoning over multiple diverse evidence sources using semantic web technologies. Experimentation also shows that ML-based triage methods can enable prioritization of certain digital evidence sources, for acquisition or analysis, with up to 95% accuracy.

    The artifacts developed in this study provide concrete ways to enhance automation in the digital forensic investigation process to increase the investigation speed and reduce the amount of costly human intervention needed.

     

  • 5. Hu, Zhuo
    et al.
    Li, Yuhong
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A Time-Scaling Data Generation Method For Internet of Things Simulation2018In: Proceedings of 2018 Seventh International Conference on Advances in Computing, Communication and Information Technology - CCIT 2018, Institute of Research Engineers and Doctors (IRED) , 2018, p. 34-40Conference paper (Refereed)
    Abstract [en]

    Simulation plays an important role on studing the Internet of Things (IoT) traffic, which has an increasing impact on network infrastructures.The existing simulation tools and mechanisms on IoT mainly focus on simulating large-scale deployment of IoT and heterogeneous IoT applications. This paper concentrates on how to simulate the lengthy, burthty and multi-level time-scale IoT applications quickly. A time-scale data generation (TSDG) method is proposed to reduce the used simulation time of different IoT scenarios while keeping the real world characteristics of the IoT applications. Implementations of TSDG in ns-3 and simulation experiments of smart home and smart shopping centre are described in the paper. The evaluations results show that the proposed TSDG method can effectively reduce the time used to simulation IoT applications in ns-3 while reflect the IoT application traffic in the real world.

  • 6.
    Kanter, Theo
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Immersive IoT in Smart Cities2017In: ICIST 2017: Proceedings of the 7th International Conference on Information Society and Technology / [ed] M. Zdravković, M. Trajanović, Z. Konjović, Society for Information Systems and Computer Networks , 2017, Vol. 1, p. 44-49Conference paper (Refereed)
    Abstract [en]

    A rapidly increasing and vast number of “things” will be connected to the Internet, in all sectors of society (people, places, sensors, homes, industry, government services, etc.). The urgency of finding sustainable solutions requires “things” and services of the overall system to display autonomic intelligent behavior. The ability of cloud infrastructure to orchestrate the fine-grained and agile control of “things” is limited. This mandates an alternative approach intelligently moving control to the “things”. Thereby we minimize the reliance on cloud infrastructure, and are able to build more agile, intelligent and effective solutions in various application areas, such as Health, Transport and through Automation. We provide examples of such novel solutions tested in “Urban ICT Arena”, a largescale smart city testbed in Stockholm.

  • 7.
    Laskowski, Kornel
    et al.
    KTH Speech, Music and Hearing.
    Heldner, Mattias
    Stockholm University, Faculty of Humanities, Department of Linguistics, Phonetics.
    Edlund, Jens
    KTH Speech, Music and Hearing.
    On the dynamics of overlap in multi-party conversation2012In: INTERSPEECH 2012: vol.1, Portland, USA: Curran Associates, Inc , 2012, p. 846-849Conference paper (Refereed)
    Abstract [en]

    Overlap, although short in duration, occurs frequently in multi- party conversation. We show that its duration is approximately log-normal, and inversely proportional to the number of simul- taneously speaking parties. Using a simple model, we demon- strate that simultaneous talk tends to end simultaneously less frequently than in begins simultaneously, leading to an arrow of time in chronograms constructed from speech activity alone. The asymmetry is significant and discriminative. It appears to be due to dialog acts which do not carry propositional content, and those which are not brought to completion. 

  • 8.
    Li, Yuhong
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Beijing University of Posts and Telecommunications, China.
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Fouassier, Nicolas
    Stenlund, Peik
    Ouyang, Kun
    A Blockchain-based Architecture for Stable and Trustworthy Smart Grid2019In: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 155, p. 410-416Article in journal (Refereed)
    Abstract [en]

    Smart Grid represents an efficient power transmission, distribution and management system. However, solutions for Smart Grid have raised security and privacy problems. Moreover, with the introduction of renewable energy resources, such as rooftop solar panels and small biogas plants, more and more electricity consumers are involved in the energy generation system. This may cause the power system unstable and/or the waste of the energy. Blockchain is a promising technology for solving these problems in the future energy system on account of its distributed trust, anonymity, data integrity and availability. In this paper, we propose a Blockchain-based architecture for Smart Grid. By using the proposed architecture, electricity consumers can be fully involved in the energy system and tracing the details of the energy they have consumed or generated. At the same time, the stability of the energy system can be kept, reducing the waste of the energy and potential hazard to the electrical equipment.

  • 9.
    Ramberg, Robert
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    When cognitive psychology came to town: an introspective analysis of when a cognitive psychologist met computer science2006In: ICT for people: 40 years of academic development in Stockholm / [ed] Janis Bubenko jr, Stockholm: Dept. of Computer & Systems Sciences (DSV), Stockholm University and Royal Institute of Technology , 2006, p. 185-189Chapter in book (Other academic)
  • 10. Reza Faragardi, Hamid
    et al.
    Fotouhi, Hossein
    Nolte, Thomas
    Rahmani, Rahim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A Cost Efficient Design of a Multi-Sink Multi-Controller WSN in a Smart Factory2017In: 2017 IEEE 19th Intl Conference on High Performance Computing and Communications HPCC 2017: Proceedings / [ed] Patrick Kellenberger, IEEE, 2017, p. 594-602Conference paper (Refereed)
    Abstract [en]

    Internet of Things (IoT), one of the key elements of a smart factory, is dubbed as Industrial IoT (IIoT). Software defined networking is a technique that benefits network management in IIoT applications by providing network reconfigurability. In this way, controllers are integrated within the network to advertise routing rules dynamically based on network and link changes. We consider controllers within Wireless Sensor Networks (WSNs) for IIoT applications in such a way to provide reliability and timeliness. Network reliability is addressed for the case of node failure by considering multiple sinks and multiple controllers. Real-time requirements are implicitly applied by limiting the number of hops (maximum path-length) between sensors and sinks/controllers, and by confining the maximum workload on each sink/controller. Deployment planning of sinks should ensure that when a sink or controller fails, the network is still connected. In this paper, we target the challenge of placement of multiple sinks and controllers, while ensuring that each sensor node is covered by multiple sinks (k sinks) and multiple controllers (k′ controllers). We evaluate the proposed algorithm using the benchmark GRASP-MSP through extensive experiments, and show that our approach outperforms the benchmark by lowering the total deployment cost by up to 24%. The reduction of the total deployment cost is fulfilled not only as the result of decreasing the number of required sinks and controllers but also selecting cost-effective sinks/controllers among all candidate sinks/controllers.

  • 11.
    Schwarz, Iris-Corinna
    et al.
    Stockholm University, Faculty of Humanities, Department of Linguistics, Phonetics.
    Marklund, Ellen
    Stockholm University, Faculty of Humanities, Department of Linguistics, Phonetics.
    Dybäck, Matilda
    Wallgren, Johanna
    Uhlén, Inger
    Pupil dilation indicates auditory signal detection - towards an objective hearing test based on eye-tracking2016Conference paper (Refereed)
    Abstract [en]

    Purpose: The long-term objective of this project is to develop an objective hearing threshold test that can be used in early infancy, using pupildilation as an indicator of hearing. The study purposes are 1) to identify relevant time-windows for analysis of pupillary responses to various auditory stimuli in adults, and 2) to evaluate a trial-minus-baseline approach to deal with unrelated pupillary responses in adults. Method: Participants’ pupil size is recorded using a Tobii T120 Eye-tracker. In the first test, participants fixate on a blank screen while sound stimuli are presented. From this data, typical pupillary responses and the relevant analysis time-window is determined and used in future tests. In the second test, participants watch movie clips while sound stimuli are presented. Visually identical sound and no-sound trials will be compared in order to isolate the pupillary changes tied to hearing sound from those related to changes in brightness in the visual stimuli. Results and conclusion: Data is currently being collected. Results from the pilot study indicate that the pupillary response related to sound detection occurs at around 900 ms after stimulus onset, and that a trial-minus-baseline approach is a viable option to eliminate unrelated pupillary responses.

  • 12. Subramaniyam, N. P.
    et al.
    Donges, Jonathan F.
    Stockholm University, Faculty of Science, Stockholm Resilience Centre.
    Hyttinen, J.
    Signatures of chaotic and stochastic dynamics uncovered with epsilon-recurrence networks2015In: Proceedings of the Royal Society. Mathematical, Physical and Engineering Sciences, ISSN 1364-5021, E-ISSN 1471-2946, Vol. 471, no 2183, article id 20150349Article in journal (Refereed)
    Abstract [en]

    An old and important problem in the field of nonlinear time-series analysis entails the distinction between chaotic and stochastic dynamics. Recently, e-recurrence networks have been proposed as a tool to analyse the structural properties of a time series. In this paper, we propose the applicability of local and global e-recurrence network measures to distinguish between chaotic and stochastic dynamics using paradigmatic model systems such as the Lorenz system, and the chaotic and hyper-chaotic Rossler system. We also demonstrate the effect of increasing levels of noise on these network measures and provide a real-world application of analysing electroencephalographic data comprising epileptic seizures. Our results show that both local and global e-recurrence network measures are sensitive to the presence of unstable periodic orbits and other structural features associated with chaotic dynamics that are otherwise absent in stochastic dynamics. These network measures are still robust at high noise levels and short data lengths. Furthermore, e-recurrence network analysis of the real-world epileptic data revealed the capability of these network measures in capturing dynamical transitions using short window sizes. e-recurrence network analysis is a powerful method in uncovering the signatures of chaotic and stochastic dynamics based on the geometrical properties of time series.

1 - 12 of 12
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf