Current Research Information SysTem In Norway
 
 

 Norsk versjon


 
Mainpage
Research results/NVI
Researchers
Projects
Research units
Log in
About Cristin
 
 
   
Back to search     Short format     Full format    
Export to


Showing results 1-24 of 24

2021
1 Afzal, Zeeshan; Anna, Brunstrom; Lindskog, Stefan.
Using Features of Encrypted Network Traffic to Detect Malware. Lecture Notes in Computer Science (LNCS) 2021 ;Volume 12556. p. 37-53
SINTEF Untitled
 
2 Bartnes, Maria; Lindskog, Stefan.
Det neste hackerangrepet kan ramme Norge. Dagens næringsliv 2021
SINTEF Untitled
 
3 Myklebust, Thor; Onshus, Tor Engebret; Lindskog, Stefan; Ottermo, Maria Vatshaug; Bodsberg, Lars.
Data Safety, Sources, and Data Flow in the Offshore Industry. I: Proceedings of the 31st European Safety and Reliability Conference. Research Publishing Services 2021 ISBN 978-981-18-2016-8. p. -
NTNU SINTEF Untitled
 
4 Myklebust, Thor; Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Bodsberg, Lars.
Data Safety, Sources, and Data Flow in the Offshore Industry. ESREL2021; 2021-09-19 - 2021-09-23
SINTEF Untitled
 
5 Myklebust, Thor; Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Lundteigen, Mary Ann.
Datakvalitet ved digitalisering i petroleumssektoren. : SINTEF 2021 (ISBN 978-82-14-06477-3) SINTEF Rapport(2021:00053)
SINTEF NTNU Untitled
 
2010
6 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Performance Evaluation of IKEv2 Authentication Methods in Next Generation Wireless Networks. Security and Communication Networks 2010 ;Volume 3.(1) p. 83-98
NTNU Untitled
 
2009
7 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
A Measurement Study on IKEv2 Authentication Performance in Wireless Networks. 6th Swedish National Computer Networking Workshop (SNCNW 2009); 2009-05-04 - 2009-05-05
NTNU Untitled
 
8 Knapskog, Svein Johan; Lindskog, Stefan.
Proceedings of the 1st International Workshop on Security and Communication Networks. Trondheim, Norway: Norwegian University of Science and Technology 2009 (ISBN 978-82-997105-1-0) 132 p.
NTNU Untitled
 
9 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
A System Architecture for Operator-Centric and Adaptive Intrusion Detection. Journal of Information Assurance and Security 2009 ;Volume 4.(3) p. 236-246
NTNU Untitled
 
10 Larson, Ulf; Nilsson, Dennis; Jonsson, Erland; Lindskog, Stefan.
Using System Call Information to Reveal Hidden Attack Manifestations. 1st International Workshop on Security and Communication Networks (IWSCN 2009); 2009-05-20 - 2009-05-22
NTNU Untitled
 
11 Lindskog, Stefan; Brunstrom, Anna.
The Design and Implementation of Secure Socket SCTP. Lecture Notes in Computer Science (LNCS) 2009 ;Volume 5730. p. 180-199
NTNU Untitled
 
2008
12 Faigl, Zoltán; Fazekas, Péter; Lindskog, Stefan; Brunstrom, Anna.
Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios. I: Advances in Mobile and Wireless Communications. Springer 2008 ISBN 978-3-540-79040-2. p. 365-385
NTNU Untitled
 
13 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Experimental Evaluation of the Performance Costs of Different IKEv2 Authentication Methods. 13th International Telecommunications Network Strategy and Planning Symposium (Networks 2008); 2008-09-28 - 2008-10-02
NTNU Untitled
 
14 Larson, Ulf; Jonsson, Erland; Lindskog, Stefan.
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. p. 624-629
NTNU Untitled
 
15 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
Decision Support for Intrusion Detection Data Collection. 13th Nordic Workshop on Secure IT Systems (NordSec 2008); 2008-10-09 - 2008-10-10
NTNU Untitled
 
16 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
Operator-Centric and Adaptive Intrusion Detection. I: The Fourth International Symposium on Information Assurance and Security, (IAS2008), Napoli, Italy. IEEE 2008 ISBN 978-0-7695-3324-7. p. 161-166
NTNU Untitled
 
17 Lindskog, Stefan; Brunstrom, Anna.
A Comparison of End-to-End Security Solutions for SCTP. 5th Swedish National Computer Networking Workshop (SNCNW 2008); 2008-04-09 - 2008-04-10
NTNU Untitled
 
18 Lindskog, Stefan; Brunstrom, Anna.
Secure Socket SCTP: A Multi-layer End-to-End Security Solution. 1st Euro-NF Socio-Economics Workshop; 2008-10-16 - 2008-10-17
NTNU Untitled
 
19 Lindskog, Stefan; Brunstrom, Anna.
The Design and Message Complexity of Secure Socket SCTP. I: Computational Science and Its Applications (ICCSA 2008), Part II. Springer 2008 ISBN 978-3-540-69840-1. p. 484-499
NTNU Untitled
 
20 Lindskog, Stefan; Brunstrom, Anna; Faigl, Zoltán.
Tunable Security Services for Wireless Networks. I: Adaptation and Cross Layer Design in Wireless Networks. CRC Press 2008 ISBN 978-1-4200-4603-8. p. 451-480
NTNU Untitled
 
21 Lindskog, Stefan; Brunstrom, Anna.
An End-to-End Security Solution for SCTP. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. p. 526-531
NTNU Untitled
 
22 Lindskog, Stefan; Faigl, Zoltán; Brunstrom, Anna.
A Conceptual Model for Analysis and Design of Tunable Security Services. Journal of Networks 2008 ;Volume 3.(5) p. 1-12
NTNU Untitled
 
23 Lundin, Reine; Lindskog, Stefan; Brunstrom, Anna.
A Model-based Analysis of Tunability in Privacy Services. I: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School. Springer Publishing Company 2008 ISBN 978-0-387-79025-1. p. 343-356
NTNU Untitled
 
2007
24 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling. I: Proceedings of 4th IEEE International Symposium on Wireless Communication Systems 2007. IEEE conference proceedings 2007 ISBN 1-4244-0979-9. p. 390-395
NTNU Untitled