dc.contributor.author | Collen, Anastasija | |
dc.contributor.author | Nijdam, Niels Alexander | |
dc.contributor.author | Augusto-Gonzalez, Javier | |
dc.contributor.author | Katsikas, Sokratis | |
dc.contributor.author | Giannoutakis, Konstantinos M. | |
dc.contributor.author | Spathoulas, Georgios | |
dc.contributor.author | Gelenbe, Erol | |
dc.contributor.author | Votis, Konstantinos | |
dc.contributor.author | Tzovaras, Dimitrios | |
dc.contributor.author | Ghavami, Navid | |
dc.contributor.author | Volkamer, Melanie | |
dc.contributor.author | Haller, Piroska | |
dc.contributor.author | Sanchez, Alvaro | |
dc.contributor.author | Dimas, Miltiadis | |
dc.date.accessioned | 2019-10-25T07:39:37Z | |
dc.date.available | 2019-10-25T07:39:37Z | |
dc.date.created | 2018-11-17T18:33:20Z | |
dc.date.issued | 2018 | |
dc.identifier.isbn | 978-3-319-95188-1 | |
dc.identifier.uri | http://hdl.handle.net/11250/2624347 | |
dc.description.abstract | We present the European research project GHOST, (Safe-guarding home IoT environments with personalised real-time risk control), which challenges the traditional cyber security solutions for the IoT by proposing a novel reference architecture that is embedded in an adequately adapted smart home network gateway, and designed to be vendor-independent. GHOST proposes to lead a paradigm shift in consumer cyber security by coupling usable security with transparency and behavioural engineering. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer Verlag | nb_NO |
dc.relation.ispartof | Security in Computer and Information Sciences, First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26–27, 2018, Revised Selected Papers, Communications in Computer and Information Science, Springer, 2018 | |
dc.title | GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 68-78 | nb_NO |
dc.identifier.doi | 10.1007/978-3-319-95189-8_7 | |
dc.identifier.cristin | 1631717 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article published in [Communications in Computer and Information Science]. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-95189-8_7 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |