• 0-RTT Key Exchange with Full Forward Secrecy 

      Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian (Chapter, 2017)
      Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ...
    • 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept 

      Haga, Simen; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2020)
      The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ...
    • A Basic Result on the Superposition of Arrival Processes in Deterministic Networks 

      Jiang, Yuming (Chapter, 2018)
      Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ...
    • A Comparison between Business Process Management and Information Security Management 

      Wangen, Gaute; Snekkenes, Einar (Chapter, 2014)
      Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ...
    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility 

      Puka, Ergys; Herrmann, Peter (Chapter, 2019)
      The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ...
    • A Fault-Tolerant and Consistent SDN Controller 

      Kamisinski, Andrzej; Gonzalez, Andres Javier; Helvik, Bjarne Emil; Nencioni, Gianfranco (Chapter, 2016)
      Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ...
    • A Framework for the Information Classification in ISO 27005 Standard 

      Agrawal, Vivek (Chapter, 2017)
      Information Security Risk Management (ISRM) process involves several activities to conduct a risk management (RM) task in an organization. ISRM activities require access to various information related to the organization. ...
    • A General Formalism for Defining and Detecting OpenFlow Rule Anomalies 

      Aryan, Ramtin; Yazidi, Anis; Engelstad, Paal E.; Kure, Øivind (Chapter, 2017)
      SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ...
    • A modeling approach for dependability analysis of smart distribution grids 

      Zerihun, Tesfaye Amare; Helvik, Bjarne Emil; Heegaard, Poul Einar (Chapter, 2018)
      The distribution grids are among the most critical infrastructures which integrates advanced control and communication technologies atop of power systems. This paper presents a comprehensive modeling framework suited to ...
    • A scalable resource allocation scheme for NFV: Balancing utilization and path stretch 

      Woldeyohannes, Yordanos Tibebu; Mohammadkhan, Ali; Ramakrishnan, K. K.; Jiang, Yuming (Chapter, 2018)
      Network Function Virtualization (NFV) implements network middlebox functions in software, enabling them to be more flexible and dynamic. NFV resource allocation methods can exploit the capabilities of virtual- ization to ...
    • A Security Policy Infrastructure for Tactical Service Oriented Architectures 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant ...
    • A Survey on Network Resiliency Methodologies against Weather-based Disruptions 

      Kmiecik, Wojciech; Rak, Jacek; Medeiros, Carmo; Heegaard, Poul Einar; Mas Machuca, Carmen; André, Joao; Jorge, Luisa; Musumeci, Francesco; Voyiatzis, Artemios; Pasic, Alija; Tornatore, Massimo; Travanca, Rui; Furdek, Marija; Hmaity, Ali; Simpson, Steven; Babarczi, Peter; Martins, Lucia; Følstad, Eirik Larsen; Braun, Torsten (Chapter, 2016)
      Due to the increasing dependence on network ser- vices of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large- scale failures, as in case of disaster ...
    • A Taxonomy of Challenges in Information Security Risk Management 

      Wangen, Gaute; Snekkenes, Einar (Chapter, 2013)
      Risk Management is viewed by many as the cornerstone of information security and is used to determine what to protect and how. How to approach risk management for information security is an ongoing debate as there are ...
    • A Taxonomy of Situations within the Context of Risk Analysis 

      Szekeres, Adam; Snekkenes, Einar Arthur (Chapter, 2019)
      Prediction of deliberate human decisions with potential negative impact on others would have great practical and scientific utility. The Conflicting Incentives Risk Analysis (CIRA) method defines risk as a result of ...
    • AccountabilityFS: A File System Monitor for Forensic Readiness 

      Nordvik, Rune; Liao, Yi-Ching; Langweg, Hanno (Chapter, 2014)
      We present a file system monitor, AccountabilityFS, which prepares an organization for forensic analysis and incident investigation in advance by ensuring file system operation traces readily available. We demonstrate the ...
    • Accuracy vs. Cost Trade-off for Machine Learning Based QoE Estimation in 5G Networks 

      Schwarzmann, Susanna; Marquezan, Clarissa Cassales; Trivisonno, Riccardo; Nakajima, Shinichi; Zinner, Thomas (Chapter, 2020)
      Since their first release, 5G systems have been enhanced with Network Data Analytics Functionalities (NWDAF) as well as with the ability to interact with 3rd parties' Application Functions (AFs). Such capabilities enable ...
    • Achieving dependability in software-defined networking - a perspective 

      Helvik, Bjarne Emil; Heegaard, Poul Einar; Mendiratta, Veena (Chapter, 2015)
      In this paper we take a closer look at the operationof software defined networking (SDN) in intra-domain networks.The focus is on the dependability issues related to interworking ofSDN controllers, network OS (NOS), and ...
    • Achieving Guaranteed Performance for Protection Traffic in Smart Grid Wide- Area Networks 

      Adrah, Charles Mawutor; Kamath, Aditya K.; Bjørnstad, Steinar; Tahiliani, Mohit P. (Chapter, 2019)
      Recent years, tele-protection applications in utility grids have been deployed using Ethernet. However, Ethernet without Time Sensitive Network (TSN) mechanisms is non-deterministic. Hence, challenges of the queuing delays ...
    • Action-Independent Generalized Behavioral Identity Descriptors for Look-alike Recognition in Videos 

      Khodabakhsh, Ali; Loiselle, Hugo (Chapter, 2020)
      There is a long history of exploitation of the visual similarity of look-alikes for fraud and deception. The visual similarity along with the application of physical and digital cosmetics greatly challenges the recognition ...