Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 10) Show all publications
Booth, T. & Andersson, K. (2017). Critical Infrastructure Network DDoS Defense, via Cognitive Learning. In: Pietro Manzoni, Universitat Politècnica de València, Spain (Ed.), : . Paper presented at 14th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, 8-11 Jan 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Critical Infrastructure Network DDoS Defense, via Cognitive Learning
2017 (English)In: / [ed] Pietro Manzoni, Universitat Politècnica de València, Spain, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017Conference paper, Published paper (Refereed)
Abstract [en]

Some public and private services are called part of the Critical Infrastructure (CI), which are considered as the most important services to protect the functioning of a society and the economy.  Many CIs provide services via the Internet and thus cyber-attacks can be performed remotely.  It is now very simple and free to find and download software, which automates performing cyber-attacks.  A recent example is that two teenagers, with close to no security knowledge, created an on-line business. They would run cyber-attacks (online booter service called vDOS, as reported by Brian Krebs) for a small fee. They reportedly earned over 600,000 USD in a short period of time by conducting a large number of automated DDoS cyber-attacks. Then Krebs was retaliated against, and the highest DDoS attack bandwidth ever recorded, 620 Gbps, was launched against Krebs. In this paper we show how cognitive learning can be used to significantly mitigate any effects of DDoS network attacks, against the critical infrastructure.

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017
Series
IEEE Consumer Communications and Networking Conference, ISSN 2331-9852, E-ISSN 2331-9860
Keywords
DDoS, Network Security
National Category
Electrical Engineering, Electronic Engineering, Information Engineering Communication Systems Information Systems, Social aspects Media and Communication Technology
Research subject
Information systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-61288 (URN)10.1109/CCNC.2017.8013423 (DOI)000412117100005 ()978-1-5090-6196-9 (ISBN)
Conference
14th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, 8-11 Jan 2017
Available from: 2016-12-29 Created: 2016-12-29 Last updated: 2019-09-13Bibliographically approved
Booth, T. & Andersson, K. (2017). DNS DDoS Mitigation, via DNS Timer Design Changes. In: Robin Doss, Welwyn Piramuthu, Wei Zhou (Ed.), Future Network Systems and Security: Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings. Paper presented at Third International Conference on Future Network Systems and Security (FNSS 2017), Gainesville, FL, August 31 - September 2, 2017 (pp. 43-55). Springer
Open this publication in new window or tab >>DNS DDoS Mitigation, via DNS Timer Design Changes
2017 (English)In: Future Network Systems and Security: Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings / [ed] Robin Doss, Welwyn Piramuthu, Wei Zhou, Springer, 2017, p. 43-55Conference paper, Published paper (Refereed)
Abstract [en]

DDoS attacks have been a problem since 2000. In October 2016, there was a major DDoS attack against the service provider Dyn’s DNS service, which took the service down. This was one of the largest bandwidth DDoS attack ever documented, with attack bandwidth over 650 Gbps. By taking down just Dyn’s DNS service, clients could not obtain the IP addresses, of the organizations hosting their DNS with Dyn, such as Twitter. Our contribution is that we have found a way to mitigate the effect of DDoS attacks against DNS services. We only require some very small algorithm changes, in the DNS protocol. More specifically, we propose to add two additional timers. Even if the end DNS clients don’t support these timers, they will receive our new functionality via the DNS resolvers and recursive servers. In summary, our contributions give much more control to the organizations, as to under which specific conditions the DNS cache entries should be aged or used. This allows the organization to (1) much more quickly expire client DNS caches and (2) to mitigate the DDoS DNS attack effects. Our contributions are also helpful to organizations, even if there are no DDoS DNS attack.

Place, publisher, year, edition, pages
Springer, 2017
Series
Communications in Computer and Information Science, ISSN 1865-0929 ; 759
Keywords
DDoS bandwidth, DNS protocol, Dyn DNS hosting, Design guidelines, Information Systems
National Category
Computer Sciences Information Systems
Research subject
Information systems; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-65265 (URN)10.1007/978-3-319-65548-2_4 (DOI)2-s2.0-85028584113 (Scopus ID)978-3-319-65547-5 (ISBN)978-3-319-65548-2 (ISBN)
Conference
Third International Conference on Future Network Systems and Security (FNSS 2017), Gainesville, FL, August 31 - September 2, 2017
Available from: 2017-08-22 Created: 2017-08-22 Last updated: 2018-01-13Bibliographically approved
Booth, T. & Andersson, K. (2017). Stronger Authentication for Password Credential Internet Services. In: Pascal Urien, Selwyn Piramuthu (Ed.), Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV): . Paper presented at 3rd Conference On Mobile And Secure Services, Miami Beach, FL, 11-12 February 2017 (pp. 41-45). Piscataway, NJ: IEEE conference proceedings, Article ID 7886566.
Open this publication in new window or tab >>Stronger Authentication for Password Credential Internet Services
2017 (English)In: Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV) / [ed] Pascal Urien, Selwyn Piramuthu, Piscataway, NJ: IEEE conference proceedings, 2017, p. 41-45, article id 7886566Conference paper, Published paper (Refereed)
Abstract [en]

Most Web and other on-line service providers (”Inter- net Services”) only support legacy ID (or email) and password (ID/PW) credential authentication. However, there are numerous vulnerabilities concerning ID/PW credentials. Scholars and the industry have proposed several improved security solutions, such as MFA, however most of the Internet Services have refused to adopt these solutions. Mobile phones are much more sensitive to these vulnerabilities (so this paper focuses on mobile phones). Many users take advantage of password managers, to keep track of all their Internet Service profiles. However, the Internet Service profiles found in password managers, are normally kept on the PC or mobile phone’s disk, in an encrypted form. Our first contribution is a design guideline, whereby the Internet Service profiles never need to touch the client’s disk. Most users would benefit, if they had the ability to use MFA, to login to a legacy Internet Service, which only supports ID/PW credential authentication. Our second contribution is a design guideline, whereby users can choose, for each legacy ID/PW Internet Service, which specific MFA they wish to use. We have also presenting conceptual design guidelines, showing that both of our contributions are minor changes to existing password managers, which can be implemented easily with low overhead.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE conference proceedings, 2017
Keywords
Mobile Device Management, Security, Credentials, Android, Identification, Authentication, Password, Stormpath
National Category
Computer Sciences Information Systems, Social aspects Media and Communication Technology
Research subject
Information systems; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-61952 (URN)10.1109/MOBISECSERV.2017.7886566 (DOI)000403395200008 ()2-s2.0-85018333420 (Scopus ID)978-1-5090-3632-5 (ISBN)
Conference
3rd Conference On Mobile And Secure Services, Miami Beach, FL, 11-12 February 2017
Projects
Centre for Critical Infrastructure and Societal Security
Available from: 2017-02-11 Created: 2017-02-11 Last updated: 2018-01-13Bibliographically approved
Booth, T. & Andersson, K. (2016). Network DDoS Layer 3/4/7 Mitigation via Dynamic Web Redirection. In: Robin Doss, Selwyn Piramuthu, Wei Zhou (Ed.), Future Network Systems and Security: Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings. Paper presented at 2nd International Conference, FNSS 2016, Paris, France, November 23-25, 2016 (pp. 111-125). New York: Springer
Open this publication in new window or tab >>Network DDoS Layer 3/4/7 Mitigation via Dynamic Web Redirection
2016 (English)In: Future Network Systems and Security: Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings / [ed] Robin Doss, Selwyn Piramuthu, Wei Zhou, New York: Springer, 2016, p. 111-125Conference paper, Published paper (Refereed)
Abstract [en]

Layer 3, 4 and 7 DDoS attacks are common and very difficult to defend against. The academic community has published hundreds of well thought out algorithms, which require changes in computer networking equipment, to better detect and mitigate these attacks. The problem with these solutions, is that they require computer networking manufacturers to make changes to their hardware and/or software. On the other hand, with our solution, absolutely no hardware or software changes are required. We only require the use of BGP4 Flow-Spec, which has already been widely deployed many years ago. Further the customers’ own ISP does not require Flow-Spec. Our algorithm protects groups of over sixty-five thousand different customers, via the aggregation into one very small Flow-Spec rule. In this paper, we propose our novel, low cost and efficient solution, to both detect and greatly mitigate any and all types of L347 DDoS Web attacks.

Place, publisher, year, edition, pages
New York: Springer, 2016
Series
Communications in Computer and Information Science, ISSN 1865-0929 ; 670
National Category
Information Systems, Social aspects
Research subject
Information systems
Identifiers
urn:nbn:se:ltu:diva-59787 (URN)10.1007/978-3-319-48021-3_8 (DOI)000406536000008 ()2-s2.0-84994091865 (Scopus ID)28d8dac8-ff99-40a6-a67a-75aba9429fbf (Local ID)978-3-319-48020-6 (ISBN)978-3-319-48021-3 (ISBN)28d8dac8-ff99-40a6-a67a-75aba9429fbf (Archive number)28d8dac8-ff99-40a6-a67a-75aba9429fbf (OAI)
Conference
2nd International Conference, FNSS 2016, Paris, France, November 23-25, 2016
Available from: 2016-10-17 Created: 2016-10-17 Last updated: 2018-07-10Bibliographically approved
Booth, T. & Andersson, K. (2015). Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services (ed.). In: (Ed.), Robin Doss; Selwyn Piramuthu; Wei Zhou (Ed.), Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Paper presented at International Conference on Future Network Systems and Security : 11/06/2015 - 13/06/2015 (pp. 1-15). Encyclopedia of Global Archaeology/Springer Verlag
Open this publication in new window or tab >>Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services
2015 (English)In: Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings / [ed] Robin Doss; Selwyn Piramuthu; Wei Zhou, Encyclopedia of Global Archaeology/Springer Verlag, 2015, p. 1-15Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we propose a solution to eliminate a popular type of Denial of Service (DoS) attack, which is a DoS amplification attack. Note that a DoS is a subset of of DDoS. Our solution protects servers running any number of TCP services. This paper is focused on the most popular type of DoS amplification attack, which uses the UDP protocol. Via DoS UDP amplification attacks, an attacker can send a 1 Gbps traffic stream to reflectors. The reflectors will then send up 556 times that amount (amplified traffic) to the victim’s server. So just ten PCs, each sending 10Mbps, can send 55 Gbps indirectly, via reflectors, to a victim’s server. Very few ISP customers have 55 Gpbs provisioned. Expensive and complex solutions exist. However our elimination techniques can be implemented very quickly, easily and at an extremely low cost.

Place, publisher, year, edition, pages
Encyclopedia of Global Archaeology/Springer Verlag, 2015
Series
Communications in Computer and Information Science, ISSN 1865-0929 ; 523
National Category
Media and Communication Technology Information Systems, Social aspects
Research subject
Mobile and Pervasive Computing; Information systems; Enabling ICT (AERI)
Identifiers
urn:nbn:se:ltu:diva-38493 (URN)10.1007/978-3-319-19210-9_1 (DOI)000374568500001 ()84937428472 (Scopus ID)cea0ac63-01c5-4791-8da6-d453ecbb3257 (Local ID)978-3-319-19209-3 (ISBN)978-3-319-19210-9 (ISBN)cea0ac63-01c5-4791-8da6-d453ecbb3257 (Archive number)cea0ac63-01c5-4791-8da6-d453ecbb3257 (OAI)
Conference
International Conference on Future Network Systems and Security : 11/06/2015 - 13/06/2015
Note

Validerad; 2015; Nivå 1; 20150326 (karand)

Available from: 2016-10-03 Created: 2016-10-03 Last updated: 2018-07-10Bibliographically approved
Booth, T. & Andersson, K. (2015). Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks (ed.). Journal of Internet Services and Information Security (JISIS), 5(3), 58-79, Article ID 5.
Open this publication in new window or tab >>Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks
2015 (English)In: Journal of Internet Services and Information Security (JISIS), ISSN 2182-2069, E-ISSN 2182-2077, Vol. 5, no 3, p. 58-79, article id 5Article in journal (Refereed) Published
Abstract [en]

Our research problem is that there are a large number of successful network reflection DDoS attacks. Via a UDP Reflection Attack, an attacker can send just 1 Gb/s of payload to innocent servers, and it is these servers which then can send over 4,600 times the payload to the victim! There are very expensive and complex solutions in use today, however most all of these on premise solutions can be easily circumvented. The academic community has not adequately addressed this research problem. We have created a new Internet services network security surface attack mitigation methodology. Our novel design patterns will help organizations improve the price/performance of their anti-network reflection solution by 100 times, as compared to common on premise solutions. Our analysis and results confirm that our solution is viable. Our novel solution is based on stateless IP packet header filtering firewalls (which can be implemented mostly in hardware due to their simplicity). We have reduced and in some cases eliminated the need for researchers to even try and find new ways to filter the same traffic via more complex, software driven stateful solutions.

Keywords
Information technology - Computer science, Informationsteknik - Datorvetenskap
National Category
Information Systems, Social aspects Media and Communication Technology
Research subject
Information systems; Mobile and Pervasive Computing; Enabling ICT (AERI)
Identifiers
urn:nbn:se:ltu:diva-9624 (URN)84959c3c-838f-4ff8-84d3-222e9c8f0e07 (Local ID)84959c3c-838f-4ff8-84d3-222e9c8f0e07 (Archive number)84959c3c-838f-4ff8-84d3-222e9c8f0e07 (OAI)
Note

Validerad; 2015; Nivå 1; 20150827 (todboo)

Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-01-10Bibliographically approved
Tesfay, W. B., Booth, T. & Andersson, K. (2012). Reputation based security model for android applications (ed.). In: (Ed.), (Ed.), 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom-2012: 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. Paper presented at International Conference on Trust, Security and Privacy in Computing and Communications : 25/06/2012 - 27/06/2012 (pp. 896-901). Piscataway, NJ: IEEE Computer Society Press
Open this publication in new window or tab >>Reputation based security model for android applications
2012 (English)In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom-2012: 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, Piscataway, NJ: IEEE Computer Society Press , 2012, p. 896-901Conference paper, Published paper (Refereed)
Abstract [en]

The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers’ cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Computer Society Press, 2012
Keywords
Smartphones, Android OS, SmartphReputation based security, Inter Process Communication, Information technology - Computer science, Informationsteknik - Datorvetenskap
National Category
Media and Communication Technology Information Systems, Social aspects
Research subject
Mobile and Pervasive Computing; Computer and Systems Science
Identifiers
urn:nbn:se:ltu:diva-29430 (URN)10.1109/TrustCom.2012.236 (DOI)2-s2.0-84868159301 (Scopus ID)2e89fc27-ef7d-40f1-823d-2b148166ac0d (Local ID)978-0-7695-4745-9 (ISBN)2e89fc27-ef7d-40f1-823d-2b148166ac0d (Archive number)2e89fc27-ef7d-40f1-823d-2b148166ac0d (OAI)
Conference
International Conference on Trust, Security and Privacy in Computing and Communications : 25/06/2012 - 27/06/2012
Projects
NIMO - Nordic Interaction and Mobility Research Platform
Note
Godkänd; 2012; 20120424 (karand)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Iqbal, S., Booth, T. & Päivärinta, T. (2012). Towards personalized system of instruction for educational online information security lab exercises: research-in-progress (ed.). In: (Ed.), Terje Fallmyr (Ed.), Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012. Paper presented at Norsk konferanse for organisasjoners bruk av informasjonsteknologi : 19/11/2012 - 21/11/2012 (pp. 133-144). Trondheim: Tapir Akademisk Forlag
Open this publication in new window or tab >>Towards personalized system of instruction for educational online information security lab exercises: research-in-progress
2012 (English)In: Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012 / [ed] Terje Fallmyr, Trondheim: Tapir Akademisk Forlag, 2012, p. 133-144Conference paper, Published paper (Refereed)
Abstract [en]

Information Security education benefits greatly from hands-on laboratory oriented exercises. Campus students often have access to security lab equipment. However, remote students, who never visit the campus, often have no laboratory access at all. While previous literature describing designs for information security laboratories are seldom based on specified pedagogical approaches or systematic design theories, this paper contributes by outlining a design theory of online InfoSec labs based on the “Personalized system of instruction” (PSI). We also illustrate the PSI-oriented approach to on-line information security education with help of design suggestions and general level evaluation measures.

Place, publisher, year, edition, pages
Trondheim: Tapir Akademisk Forlag, 2012
Series
NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi, ISSN 1894-7719
Keywords
Information security, Security lab, Personalized system of instruction, Statistics, computer and systems science - Informatics, computer and systems science, Statistik, data- och systemvetenskap - Informatik, data- och systemvetenskap
National Category
Information Systems, Social aspects
Research subject
Computer and Systems Science
Identifiers
urn:nbn:se:ltu:diva-39399 (URN)e238533c-1db7-4892-8809-8ce9060ee194 (Local ID)978-82-321-0185-6 (ISBN)e238533c-1db7-4892-8809-8ce9060ee194 (Archive number)e238533c-1db7-4892-8809-8ce9060ee194 (OAI)
Conference
Norsk konferanse for organisasjoners bruk av informasjonsteknologi : 19/11/2012 - 21/11/2012
Note
Validerad; 2012; 20121116 (terpai)Available from: 2016-10-03 Created: 2016-10-03 Last updated: 2018-02-27Bibliographically approved
Iqbal, S., Booth, T. & Päivärinta, T. (2012). Towards personalized system of instruction for educational online information security lab exercises: research-in-progress (ed.). In: (Ed.), Terje Fallmyr (Ed.), Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012. Paper presented at Norsk konferanse for organisasjoners bruk av informasjonsteknologi : 19/11/2012 - 21/11/2012 (pp. 133-144). Trondheim: Tapir Akademisk Forlag
Open this publication in new window or tab >>Towards personalized system of instruction for educational online information security lab exercises: research-in-progress
2012 (English)In: Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012 / [ed] Terje Fallmyr, Trondheim: Tapir Akademisk Forlag, 2012, p. 133-144Conference paper, Published paper (Refereed)
Abstract [en]

Information Security education benefits greatly from hands-on laboratory oriented exercises. Campus students often have access to security lab equipment. However, remote students, who never visit the campus, often have no laboratory access at all. While previous literature describing designs for information security laboratories are seldom based on specified pedagogical approaches or systematic design theories, this paper contributes by outlining a design theory of online InfoSec labs based on the “Personalized system of instruction” (PSI). We also illustrate the PSI-oriented approach to on-line information security education with help of design suggestions and general level evaluation measures.

Place, publisher, year, edition, pages
Trondheim: Tapir Akademisk Forlag, 2012
Series
NOKOBIT - Norsk konferanse for organisasjoners bruk av informasjonsteknologi, ISSN 1894-7719
Keywords
Information security, Security lab, Personalized system of instruction, Statistics, computer and systems science - Informatics, computer and systems science, Statistik, data- och systemvetenskap - Informatik, data- och systemvetenskap
National Category
Information Systems, Social aspects
Research subject
Computer and Systems Science
Identifiers
urn:nbn:se:ltu:diva-37045 (URN)aeafdd7e-2de8-4f85-8ffe-dda3f5cb71ae (Local ID)978-82-321-0185-6 (ISBN)aeafdd7e-2de8-4f85-8ffe-dda3f5cb71ae (Archive number)aeafdd7e-2de8-4f85-8ffe-dda3f5cb71ae (OAI)
Conference
Norsk konferanse for organisasjoners bruk av informasjonsteknologi : 19/11/2012 - 21/11/2012
Note
Godkänd; 2012; 20140504 (todboo)Available from: 2016-10-03 Created: 2016-10-03 Last updated: 2018-02-27Bibliographically approved
Kilinc, C., Booth, T. & Andersson, K. (2012). WallDroid: cloud assisted virtualized application specific firewalls for the Android OS (ed.). In: (Ed.), (Ed.), 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom-2012: 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. Paper presented at International Conference on Trust, Security and Privacy in Computing and Communications : 25/06/2012 - 27/06/2012 (pp. 877-883). Piscataway, NJ: IEEE Computer Society Press
Open this publication in new window or tab >>WallDroid: cloud assisted virtualized application specific firewalls for the Android OS
2012 (English)In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications - TrustCom-2012: 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, Piscataway, NJ: IEEE Computer Society Press , 2012, p. 877-883Conference paper, Published paper (Refereed)
Abstract [en]

Security is becoming an increasingly important feature of today's mobile environment where users download unknown apps and connect their smartphones to unknown networks while roaming. This paper proposes and evaluates an enhanced security model and architecture, WallDroid, enabling virtualized application specific firewalls managed by the cloud. The WallDroid solution can be considered as an Android Firewall Application but with some extra functionality. Key components used by the solution include VPN technologies like the Point to Point Tunneling Protocol (PPTP) and the Android Cloud to Device Messaging Framework (C2DM). Our solution is based on the cloud keeping track of millions of applications and their reputation (good, bad, or unknown) and comparing traffic flows of applications with a list of known malicious IP servers. We describe a prototype implementation and evaluate our solution.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Computer Society Press, 2012
Keywords
Android OS, Security, Mobility, Cloud Computing, Information technology - Computer science, Informationsteknik - Datorvetenskap
National Category
Media and Communication Technology Information Systems, Social aspects
Research subject
Mobile and Pervasive Computing; Computer and Systems Science
Identifiers
urn:nbn:se:ltu:diva-28107 (URN)10.1109/TrustCom.2012.298 (DOI)2-s2.0-84868120043 (Scopus ID)1c51110c-adba-4d12-8fda-5923c3c64fc0 (Local ID)978-0-7695-4745-9 (ISBN)1c51110c-adba-4d12-8fda-5923c3c64fc0 (Archive number)1c51110c-adba-4d12-8fda-5923c3c64fc0 (OAI)
Conference
International Conference on Trust, Security and Privacy in Computing and Communications : 25/06/2012 - 27/06/2012
Projects
NIMO - Nordic Interaction and Mobility Research Platform
Note
Godkänd; 2012; 20120424 (karand)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0593-1253

Search in DiVA

Show all publications