|
|
Norsk
versjon
In order to register data in Cristin, you must be an academic or administrative employee.
|
|
|
|
|
|
|
|
|
Showing results 1-24 of 24
|
|
2021
|
1. |
Afzal, Zeeshan; Anna, Brunstrom; Lindskog, Stefan. Using Features of Encrypted Network Traffic to Detect Malware. Lecture Notes in Computer Science (LNCS) 2021 ;Volume 12556. p. 37-53 SINTEF
Untitled
|
|
2. |
Bartnes, Maria; Lindskog, Stefan. Det neste hackerangrepet kan ramme Norge. Dagens næringsliv 2021 SINTEF
Untitled
|
|
3. |
Myklebust, Thor; Onshus, Tor Engebret; Lindskog, Stefan; Ottermo, Maria Vatshaug; Bodsberg, Lars. Data Safety, Sources, and Data Flow in the Offshore Industry. I: Proceedings of the 31st European Safety and Reliability Conference. Research Publishing Services 2021 ISBN 978-981-18-2016-8. p. - NTNU SINTEF
Untitled
|
|
4. |
Myklebust, Thor; Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Bodsberg, Lars. Data Safety, Sources, and Data Flow in the Offshore Industry. ESREL2021; 2021-09-19 - 2021-09-23 SINTEF
Untitled
|
|
5. |
Myklebust, Thor; Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Lundteigen, Mary Ann. Datakvalitet ved digitalisering i petroleumssektoren. : SINTEF 2021 (ISBN 978-82-14-06477-3) SINTEF Rapport(2021:00053) SINTEF NTNU
Untitled
|
2010
|
6. |
Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna. Performance Evaluation of IKEv2 Authentication Methods in Next Generation Wireless Networks. Security and Communication Networks 2010 ;Volume 3.(1) p. 83-98 NTNU
Untitled
|
2009
|
7. |
Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks. 6th Swedish National Computer Networking Workshop (SNCNW 2009); 2009-05-04 - 2009-05-05 NTNU
Untitled
|
|
8. |
Knapskog, Svein Johan; Lindskog, Stefan. Proceedings of the 1st International Workshop on Security and Communication Networks. Trondheim, Norway: Norwegian University of Science and Technology 2009 (ISBN 978-82-997105-1-0) 132 p. NTNU
Untitled
|
|
9. |
Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland. A System Architecture for Operator-Centric and Adaptive Intrusion Detection. Journal of Information Assurance and Security 2009 ;Volume 4.(3) p. 236-246 NTNU
Untitled
|
|
10. |
Larson, Ulf; Nilsson, Dennis; Jonsson, Erland; Lindskog, Stefan. Using System Call Information to Reveal Hidden Attack Manifestations. 1st International Workshop on Security and Communication Networks (IWSCN 2009); 2009-05-20 - 2009-05-22 NTNU
Untitled
|
|
11. |
Lindskog, Stefan; Brunstrom, Anna. The Design and Implementation of Secure Socket SCTP. Lecture Notes in Computer Science (LNCS) 2009 ;Volume 5730. p. 180-199 NTNU
Untitled
|
2008
|
12. |
Faigl, Zoltán; Fazekas, Péter; Lindskog, Stefan; Brunstrom, Anna. Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios. I: Advances in Mobile and Wireless Communications. Springer 2008 ISBN 978-3-540-79040-2. p. 365-385 NTNU
Untitled
|
|
13. |
Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna. Experimental Evaluation of the Performance Costs of Different IKEv2 Authentication Methods. 13th International Telecommunications Network Strategy and Planning Symposium (Networks 2008); 2008-09-28 - 2008-10-02 NTNU
Untitled
|
|
14. |
Larson, Ulf; Jonsson, Erland; Lindskog, Stefan. A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. p. 624-629 NTNU
Untitled
|
|
15. |
Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland. Decision Support for Intrusion Detection Data Collection. 13th Nordic Workshop on Secure IT Systems (NordSec 2008); 2008-10-09 - 2008-10-10 NTNU
Untitled
|
|
16. |
Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland. Operator-Centric and Adaptive Intrusion Detection. I: The Fourth International Symposium on Information Assurance and Security, (IAS2008), Napoli, Italy. IEEE 2008 ISBN 978-0-7695-3324-7. p. 161-166 NTNU
Untitled
|
|
17. |
Lindskog, Stefan; Brunstrom, Anna. A Comparison of End-to-End Security Solutions for SCTP. 5th Swedish National Computer Networking Workshop (SNCNW 2008); 2008-04-09 - 2008-04-10 NTNU
Untitled
|
|
18. |
Lindskog, Stefan; Brunstrom, Anna. Secure Socket SCTP: A Multi-layer End-to-End Security Solution. 1st Euro-NF Socio-Economics Workshop; 2008-10-16 - 2008-10-17 NTNU
Untitled
|
|
19. |
Lindskog, Stefan; Brunstrom, Anna. The Design and Message Complexity of Secure Socket SCTP. I: Computational Science and Its Applications (ICCSA 2008), Part II. Springer 2008 ISBN 978-3-540-69840-1. p. 484-499 NTNU
Untitled
|
|
20. |
Lindskog, Stefan; Brunstrom, Anna; Faigl, Zoltán. Tunable Security Services for Wireless Networks. I: Adaptation and Cross Layer Design in Wireless Networks. CRC Press 2008 ISBN 978-1-4200-4603-8. p. 451-480 NTNU
Untitled
|
|
21. |
Lindskog, Stefan; Brunstrom, Anna. An End-to-End Security Solution for SCTP. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. p. 526-531 NTNU
Untitled
|
|
22. |
Lindskog, Stefan; Faigl, Zoltán; Brunstrom, Anna. A Conceptual Model for Analysis and Design of Tunable Security Services. Journal of Networks 2008 ;Volume 3.(5) p. 1-12 NTNU
Untitled
|
|
23. |
Lundin, Reine; Lindskog, Stefan; Brunstrom, Anna. A Model-based Analysis of Tunability in Privacy Services. I: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School. Springer Publishing Company 2008 ISBN 978-0-387-79025-1. p. 343-356 NTNU
Untitled
|
2007
|
24. |
Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna. Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling. I: Proceedings of 4th IEEE International Symposium on Wireless Communication Systems 2007. IEEE conference proceedings 2007 ISBN 1-4244-0979-9. p. 390-395 NTNU
Untitled
|
|