Recent Submissions

  • Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems 

    Akbarzadeh, Aida; Katsikas, Sokratis K. (Peer reviewed; Journal article, 2021)
    Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ...
  • Exploring the Computational Cost of Machine Learning at the Edge for Human-Centric Internet of Things 

    Gómez-Carmona, Oihane; Casado Mansilla, Diego; Kraemer, Frank Alexander; Lopez-de-Ipina, Diego; Garcia-Zubia, Javier (Peer reviewed; Journal article, 2020)
    In response to users’ demand for privacy, trust and control over their data, executing machine learning tasks at the edge of the system has the potential to make the Internet of Things (IoT) applications and services more ...
  • Identity management on blockchain – privacy and security aspects 

    Panait, Andreea Elena; Olimid, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
    In the last years, identity management solutions on blockchain were proposed as a possible solution to digital identity management problems. However, they are still at an early stage, and further research needs to be done ...
  • Linking QoE and Performance Models for DASH-based Video Streaming 

    Schwarzmann, Susanna; Zinner, Thomas (Chapter, 2020)
    HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. Splitting the video clip into small segments and providing multiple quality levels per segment allows the client to dynamically ...
  • Comparing fixed and variable segment durations for adaptive video streaming: a holistic analysis 

    Schwarzmann, Susanna; Hainke, Nick; Zinner, Thomas; Sieber, Christian; Robitza, Werner; Raake, Alexander (Chapter, 2020)
    HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. It enables dynamic adaptation of video quality by splitting a video into small segments and providing multiple quality levels per ...
  • P4CONSIST: Towards Consistent P4 SDNs 

    Shukla, Apoorv; Fathalli, Seifeddine; Zinner, Thomas; Hecker, Artur; Schmid, Stefan (Peer reviewed; Journal article, 2020)
    The prevailing wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Unfortunately, bugs, ...
  • A Modern View on Forward Security 

    Boyd, Colin Alexander; Gellert, Kai (Peer reviewed; Journal article, 2020)
    Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world ...
  • Resilience Analysis of Software-Defined Networks Using Queueing Networks 

    Nweke, Livinus Obiora; Wolthusen, Stephen (Chapter, 2020)
    Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ...
  • Accuracy vs. Cost Trade-off for Machine Learning Based QoE Estimation in 5G Networks 

    Schwarzmann, Susanna; Marquezan, Clarissa Cassales; Trivisonno, Riccardo; Nakajima, Shinichi; Zinner, Thomas (Chapter, 2020)
    Since their first release, 5G systems have been enhanced with Network Data Analytics Functionalities (NWDAF) as well as with the ability to interact with 3rd parties' Application Functions (AFs). Such capabilities enable ...
  • Difficult SQLi Code Patterns for Static Code Analysis Tools 

    Schuckert, Felix; Katt, Basel; Langweg, Hanno (Peer reviewed; Journal article, 2020)
    We compared vulnerable and xed versions of the source code of 50 dierent PHP open source projects based on CVE reports for SQL injection vulnerabilities. We scanned the source code with commercial and open source tools for ...
  • Constrained Approximate Search Algorithms in Knowledge Discovery 

    Petrovic, Slobodan; Sidorova, Julia (Journal article, 2020)
    Knowledge discovery in big data is one of the most important applications of computing machinery today. Search is essential part of all such procedures. Search algorithms must be extremely efficient, but at the same time ...
  • Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 

    Amro, Ahmed Walid; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2020)
    Recent innovations in the smart city domain include new autonomous transportation solutions such as buses and cars, while Autonomous Passenger Ships (APS) are being considered for carrying passengers across urban waterways. ...
  • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

    Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
    Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
  • Using informed access network selection to improve HTTP adaptive streaming performance 

    Enghardt, Theresa; Zinner, Thomas; Feldmann, Anja (Chapter, 2020)
    As end-user devices often have multiple access networks available, choosing the most suitable network can help to improve application performance and user experience. However, selecting the best access network for HTTP ...
  • IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications 

    Shalaginov, Andrii; Iqbal, Asif; Olegård, Johannes (Chapter, 2020)
    Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the ...
  • Social Constructionism in Security Protocols 

    Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
    Understanding the human in computer security through Qualitative Research aims at a conceptual repositioning. The aim is to leverage individual human experience to understand and improve the impact of humans in computer ...
  • Joint head selection and airtime allocation for data dissemination in mobile social networks 

    Mao, Zhifei; Jiang, Yuming; Di, Xiaoqiang; Woldeyohannes, Yordanos Tibebu (Peer reviewed; Journal article, 2020)
    By forming a temporary group, users in mobile social networks (MSNs) can disseminate data to others in proximity with short-range communication technologies. However, due to user mobility, airtime available for users in ...
  • Optimal release time determination using FMOCCP involving randomized cost budget for FSDE-based software reliability growth model 

    Chatterjee, Subhashish; Chaudhuri, Bhagyashree; Bhar, Chandan; Shukla, Ankur (Peer reviewed; Journal article, 2019)
    This paper presents a software reliability growth model (SRGM) based on a fuzzy stochastic differential equation (FSDE) approach. The software shall comprise of dependent and independent main and sub-components owing to a ...
  • Social Constructionism in Security Protocols (Transcript of Discussion) 

    Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
    This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. ...
  • Multi-feature Multimodal Biometric Recognition Based on Quaternion Locality Preserving Projection 

    Wang, Zhifang; Zhen, Jiaqi; Li, Yanchao; Li, Guoqiang; Han, Qi (Peer reviewed; Journal article, 2019)
    This paper proposed Quaternion locality preserving projection (QLPP) for multi-feature multimodal biometric recognition. Multi-features fill the real part or the three imaginary parts of quaternion to constitute the ...

View more