• Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical Systems 

      Spathoulas, Georgios; Kavallieratos, Georgios; Katsikas, Sokratis; Baiocco, Alessio (Chapter, 2022)
      The increasing integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other. This ...
    • Attack Path Analysis for Cyber Physical Systems 

      Kavallieratos, Georgios; Katsikas, Sokratis (Chapter, 2020)
      The identification and analysis of potential paths that an adversary may exploit to attack Cyber Physical Systems comprising sub-systems enables the comprehensive understanding of the attacks and the impact that may have ...
    • Audiouth: Multi-factor Authentication Based on Audio Signal 

      Fauzi, Muhammad Ali; Yang, Bian (Chapter, 2020)
      Despite its popularity, password-based authentication has several crucial security problems. The multi-factor authentication system has risen as a popular alternative method to improve password security by applying additional ...
    • Authenticated Encryption for Janus-Based Acoustic Underwater Communication 

      Petrovic, Branislav; Teglasy, Balint Zoltan; Katsikas, Sokratis (Chapter, 2022)
      Wireless underwater communications commonly utilize acoustic waves due to their superior robustness and range compared to radio waves. But usage of acoustic waves introduces some constraints, such as a low data rate and ...
    • Autonomous Management of Energy-Harvesting IoT Nodes Using Deep Reinforcement Learning 

      Murad, Abdulmajid Abdullah Yahya; Kraemer, Frank Alexander; Bach, Kerstin; Taylor, Gavin (Chapter, 2019)
      Reinforcement learning (RL) is capable of managing wireless, energy-harvesting IoT nodes by solving the problem of autonomous management in non-stationary, resource-constrained settings. We show that the state-of-the-art ...
    • Availability Modelling of Software-Defined Backbone Networks 

      Kamisinski, Andrzej; Gonzalez, Andres Javier; Helvik, Bjarne Emil; Nencioni, Gianfranco; Heegaard, Poul Einar (Chapter, 2016)
      Software-Defined Networking (SDN) promises to improve the programmability and flexibility of networks, but it may also bring new challenges that need to be explored. The main objective of this paper is to present a ...
    • Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive Streaming 

      Alissa, Ali; Bentaleb, Abdelhak; Barakabitze, Alcardo; Ghita, Bogdan V.; Zinner, Thomas (Chapter, 2019)
      The majority of Internet video traffic today is delivered via HTTP Adaptive Streaming (HAS). Recent studies concluded that pure client-driven HAS adaptation is likely to be sub-optimal, given clients adjust quality based ...
    • BatCave: Adding Security to the BATMAN Protocol 

      Bowitz, Anne Gabrielle; Graarud, Espen Grannes; Brown, Lawrie; JAATUN, Martin Gilje (Chapter, 2011)
      The Better Approach To Mobile Ad-hoc Networking (BATMAN) protocol is intended as a replacement for protocols such as OLSR, but just like most such efforts, BATMAN has no built-in security features. In this paper we describe ...
    • BBGDASH: A Max-Min Bounded Bitrate Guidance for SDN Enabled Adaptive Video Streaming 

      Al-Issa, Ali; Bentaleb, Abdelhak; Zinner, Thomas Erich; Mkwawa, Is-Haka; Ghita, Bogdan V. (Chapter, 2019)
      The increase in video traffic and the end-user demands for high-quality videos have triggered academia and industry to find novel mechanisms for media distribution. Among the available streaming services, HTTP adaptive ...
    • Behavior as a Function of Video Quality in an Ecologically Valid Experiment 

      Wanat, Dominika; Janowski, Lucjan; de Moor, Katrien Rachel W (Chapter, 2023)
      Most user studies in the QoE multimedia domain are done by asking users about quality. This approach has advantages: it obtains many answers and reduces variance by repeated measurements. However, the results obtained in ...
    • Benchmarking Binarisation Schemes for Deep Face Templates 

      Drozdowski, Pawel; Struck, Florian; Rathgeb, Christian; Busch, Christoph (Chapter, 2018)
      Feature vectors extracted from biometric characteristics are often represented using floating point values. It is, however, more appealing to store and compare feature vectors in a binary representation, since it generally ...
    • Blockchain Support For Time-Critical Self-Healing In Smart Distribution Grids 

      Gebraselase, Befekadu; Adrah, Charles Mawutor; Zerihun, Tesfaye Amare; Helvik, Bjarne Emil; Heegaard, Poul Einar (Chapter, 2022)
      Smart distribution grids have new protection concepts known as fault self-healing whereby Intelligent Electronic Devices (IEDs) can automatically reconfigure the power circuits to isolate faults and restore power to the ...
    • Bootstrapping the Paysim Financial Simulator for Open Source 

      Lopez-Rojas, Edgar Alonso; Franke, Katrin (Chapter, 2017)
      PaySim Simulator is an approach to the the lack of legitimate datasets on mobile money transactions to perform and experiment with fraud detection techniques. In this paper we used a technique called bootstrapping which ...
    • Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute 

      Abomhara, Mohamed; Yildirim Yayilgan, Sule; Shalaginova, Marina; Székely, Zoltán (Chapter, 2020)
      This paper discusses concerns pertaining to the absoluteness of the right to privacy regarding the use of biometric data for border control. The discussion explains why privacy cannot be absolute from different points of ...
    • Bring the user to the network: 5G and beyond 

      Ystgaard, Kaja; De Moor, Katrien (Chapter, 2021)
      Communication networks beyond 5G will bring about a human existence that is ever more virtual. Allowing new communication services with virtual existence and involvement everywhere is likely to redefine and place new demands ...
    • Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT 

      Shrestha, Manish; Johansen, Christian; Noll, Josef (Chapter, 2020)
      The proliferation of IoT (Internet of Things) though making life easier, comes with security and privacy challenges. We have previously proposed a security classification methodology meant to help in practice build IoT ...
    • Can Blockchain Spark off the Reincarnation of India’s Living Dead? 

      Pandey, Pankaj (Chapter, 2018)
      A large number of studies have found a negative correlation between economic growth and corruption. Therefore, governments implement various anti-corruption measures particularly technology-based mechanisms. The government ...
    • CIRA Perspective on Risks Within UnRizkNow — A Case Study 

      Agrawal, Vivek; Szekeres, Adam (Chapter, 2017)
      UnRizkNow is a community of practice for cyber security practitioners in Norway. It is imperative for the establishment of UnRizkNow to identify the underlying risks that can affect the normal operation of the community. ...
    • Classification of Fingerprints Captured Using Optical Coherence Tomography 

      Sousedik, Ctirad; Breithaupt, Ralph; Bours, Patrick (Chapter, 2017)
      We propose a technique for analysis of fingerprints scanned free-air (not pressed against a glass) with Optical Coherence Tomography (OCT). Fingerprints from the surface and subdermal parts of the finger are extracted from ...
    • Classification of Methamorphic Malware with Deep Learning (LSTM) 

      Catak, Ferhat Özgur; Yazi, Ahmet Faruk; Gul, Ensar (IEEE Conference Publication;, Chapter, 2019)
      Nowadays, anti-virus applications using traditional signature-based detection methods fail to detect metamorphic malware. For this reason, recent studies on the detection and classification of malicious software address ...