Cyber Security for Next Generation Factory

Project: Other

More filtering options
  1. 2019
  2. Quality-Elasticity: Improved Resource Utilization, Throughput, and Response Times Via Adjusting Output Quality to Current Operating Conditions

    Larsson, L., William Tärneberg, Klein, C. & Elmroth, E., 2019 Sep 12, IEEE International Conference on Autonomic Computing (ICAC). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. Metadata filtering for user-friendly centralized biometric authentication

    Christian Gehrmann, Rodan, M. & Jönsson, N., 2019 Jun 6, In : EURASIP Journal on Information Security. 2019, 1, 17 p., 7.

    Research output: Contribution to journalArticle

  4. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks

    Emma Fitzgerald & Pióro, M., 2019, (Accepted/In press) International Workshop on Resilient Networks Design and Modelling (RNDM). IEEE - Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication

    Emma Fitzgerald, Pióro, M. & Tomaszewski, A., 2019, In : Ad Hoc Networks. 101987.

    Research output: Contribution to journalArticle

  7. SDN Access Control for the Masses

    Nicolae Paladi & Christian Gehrmann, 2019, In : Computers and Security. 80, p. 155-172 18 p.

    Research output: Contribution to journalArticle

  8. 2018
  9. Control over the Edge Cloud - An MPC Example

    Karl-Erik Årzén, Per Skarin, William Tärneberg & Maria Kihl, 2018 Nov 1, (Accepted/In press).

    Research output: Contribution to conferencePaper, not in proceeding

  10. Towards Mission-Critical Control at the Edge and Over 5G

    Per Skarin, William Tärneberg, Karl-Erik Årzén & Maria Kihl, 2018 Jul, 2018 IEEE International Conference on Edge Computing (EDGE). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 171-191 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding