Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-23 av 23

2021
1 Afzal, Zeeshan; Anna, Brunstrom; Lindskog, Stefan.
Using Features of Encrypted Network Traffic to Detect Malware. Lecture Notes in Computer Science (LNCS) 2021
SINTEF Untitled
 
2 Bartnes, Maria; Lindskog, Stefan.
Det neste hackerangrepet kan ramme Norge. Dagens næringsliv 2021
SINTEF Untitled
 
3 Myklebust, Thor; Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Lundteigen, Mary Ann.
Datakvalitet ved digitalisering i petroleumssektoren. SINTEF akademisk forlag 2021 SINTEF Rapport(2021:00053)
SINTEF NTNU Untitled
 
4 Onshus, Tor; Lindskog, Stefan; Ottermo, Maria Vatshaug; Bodsberg, Lars.
Data Safety, Sources, and Data Flow in the Offshore Industry. ESREL2021; 2021-09-19 - 2021-09-23
SINTEF Untitled
 
2010
5 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Performance Evaluation of IKEv2 Authentication Methods in Next Generation Wireless Networks. Security and Communication Networks 2010 ;Volum 3.(1) s. 83-98
NTNU Untitled
 
2009
6 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
A Measurement Study on IKEv2 Authentication Performance in Wireless Networks. 6th Swedish National Computer Networking Workshop (SNCNW 2009); 2009-05-04 - 2009-05-05
NTNU Untitled
 
7 Knapskog, Svein Johan; Lindskog, Stefan.
Proceedings of the 1st International Workshop on Security and Communication Networks. Trondheim, Norway: Norwegian University of Science and Technology 2009 (ISBN 978-82-997105-1-0) 132 s.
NTNU Untitled
 
8 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
A System Architecture for Operator-Centric and Adaptive Intrusion Detection. Journal of Information Assurance and Security 2009 ;Volum 4.(3) s. 236-246
NTNU Untitled
 
9 Larson, Ulf; Nilsson, Dennis; Jonsson, Erland; Lindskog, Stefan.
Using System Call Information to Reveal Hidden Attack Manifestations. 1st International Workshop on Security and Communication Networks (IWSCN 2009); 2009-05-20 - 2009-05-22
NTNU Untitled
 
10 Lindskog, Stefan; Brunstrom, Anna.
The Design and Implementation of Secure Socket SCTP. Lecture Notes in Computer Science (LNCS) 2009 ;Volum 5730. s. 180-199
NTNU Untitled
 
2008
11 Faigl, Zoltán; Fazekas, Péter; Lindskog, Stefan; Brunstrom, Anna.
Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios. I: Advances in Mobile and Wireless Communications. Springer 2008 ISBN 978-3-540-79040-2. s. 365-385
NTNU Untitled
 
12 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Experimental Evaluation of the Performance Costs of Different IKEv2 Authentication Methods. 13th International Telecommunications Network Strategy and Planning Symposium (Networks 2008); 2008-09-28 - 2008-10-02
NTNU Untitled
 
13 Larson, Ulf; Jonsson, Erland; Lindskog, Stefan.
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. s. 624-629
NTNU Untitled
 
14 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
Decision Support for Intrusion Detection Data Collection. 13th Nordic Workshop on Secure IT Systems (NordSec 2008); 2008-10-09 - 2008-10-10
NTNU Untitled
 
15 Larson, Ulf; Lindskog, Stefan; Nilsson, Dennis; Jonsson, Erland.
Operator-Centric and Adaptive Intrusion Detection. I: The Fourth International Symposium on Information Assurance and Security, (IAS2008), Napoli, Italy. IEEE 2008 ISBN 978-0-7695-3324-7. s. 161-166
NTNU Untitled
 
16 Lindskog, Stefan; Brunstrom, Anna.
A Comparison of End-to-End Security Solutions for SCTP. 5th Swedish National Computer Networking Workshop (SNCNW 2008); 2008-04-09 - 2008-04-10
NTNU Untitled
 
17 Lindskog, Stefan; Brunstrom, Anna.
Secure Socket SCTP: A Multi-layer End-to-End Security Solution. 1st Euro-NF Socio-Economics Workshop; 2008-10-16 - 2008-10-17
NTNU Untitled
 
18 Lindskog, Stefan; Brunstrom, Anna.
The Design and Message Complexity of Secure Socket SCTP. I: Computational Science and Its Applications (ICCSA 2008), Part II. Springer 2008 ISBN 978-3-540-69840-1. s. 484-499
NTNU Untitled
 
19 Lindskog, Stefan; Brunstrom, Anna; Faigl, Zoltán.
Tunable Security Services for Wireless Networks. I: Adaptation and Cross Layer Design in Wireless Networks. CRC Press 2008 ISBN 978-1-4200-4603-8. s. 451-480
NTNU Untitled
 
20 Lindskog, Stefan; Brunstrom, Anna.
An End-to-End Security Solution for SCTP. I: ARES 2008: The Third International Conference on Availability, Security and Reliability. IEEE 2008 ISBN 0-7695-3102-4. s. 526-531
NTNU Untitled
 
21 Lindskog, Stefan; Faigl, Zoltán; Brunstrom, Anna.
A Conceptual Model for Analysis and Design of Tunable Security Services. Journal of Networks 2008 ;Volum 3.(5) s. 1-12
NTNU Untitled
 
22 Lundin, Reine; Lindskog, Stefan; Brunstrom, Anna.
A Model-based Analysis of Tunability in Privacy Services. I: The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School. Springer Publishing Company 2008 ISBN 978-0-387-79025-1. s. 343-356
NTNU Untitled
 
2007
23 Faigl, Zoltán; Lindskog, Stefan; Brunstrom, Anna.
Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling. I: Proceedings of 4th IEEE International Symposium on Wireless Communication Systems 2007. IEEE conference proceedings 2007 ISBN 1-4244-0979-9. s. 390-395
NTNU Untitled