Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Ulf Lindqvist"'
Autor:
Ulf Lindqvist
We present a novel linear algebra formulation of the math behind the FastMultipole Method (FMM). For this, we introduce the Taylor numbers. They are polynomials governed by differential algebra but used like integers and floating points. They help si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bc14bd9709520b0ca27579a1fd256e7
https://doi.org/10.14293/s2199-1006.1.sor-.pprxr9a.v1
https://doi.org/10.14293/s2199-1006.1.sor-.pprxr9a.v1
Autor:
Gabriela F. Ciocarlie, Michael Emmi, Michael E. Locasto, Tancrède Lepoint, Ulf Lindqvist, Prashant Anantharaman, Bogdan Copos, Ioannis Agadakos, Liwei Song
Publikováno v:
Modeling and Design of Secure Internet of Things
Autor:
Laura Tinnel, Ulf Lindqvist
Publikováno v:
Critical Infrastructure Protection XVI ISBN: 9783031201363
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cc3b3eb54d24739662c1236c0918e90
https://doi.org/10.1007/978-3-031-20137-0_3
https://doi.org/10.1007/978-3-031-20137-0_3
Autor:
Prashant Anantharaman, Bogdan Copos, Ulf Lindqvist, Gabriela F. Ciocarlie, Michael E. Locasto, Liwei Song, Ioannis Agadakos
Publikováno v:
IOT
As the Internet of Things (IoT) becomes more ingrained in our daily lives and environments, asset enumeration, characterization, and monitoring become crucial, yet challenging tasks. A vast number of gadgets in the market have a smartphone-based comp
Autor:
Peter G. Neumann, Ulf Lindqvist
Publikováno v:
Communications of the ACM. 60:26-30
The IoT can become ubiquitous worldwide---if the pursuit of systemic trustworthiness can overcome the potential risks.
Autor:
Robert K. Cunningham, Ulf Lindqvist, Summer Craze Fowler, Dinara Doyle, Trent Jaeger, Archer Batcheller
Publikováno v:
IEEE Security & Privacy. 15:85-87
IEEE Secure Development Conference (SecDev) is a venue for presenting ideas, research, and experience about how to develop secure systems. Please visit secdev.ieee.org for more information about the upcoming conference in September.
Autor:
Gabriela F. Ciocarlie, Michael E. Locasto, James Michaelis, Ulf Lindqvist, Bogdan Copos, Tancrède Lepoint, Ioannis Agadakos
Publikováno v:
FUSION
As networked devices and applications make their way into our battlefields, their behaviors need to take into account these highly adversarial cyber-physical environments. On the dark side of the spectrum, undesired side-channels put our sensitive da
Publikováno v:
IT Professional. 17:62-65
New and innovative cybersecurity technologies are essential to ensure that information systems and critical infrastructure are secure and resilient. These technologies must also meet the needs of IT professionals and be available via channels accepta
Publikováno v:
IEEE Security & Privacy. 14:82-84
It's clear that developers, researchers, and practitioners need a venue to discuss design approaches and tools for how to build security in and significantly reduce the introduction of vulnerabilities. Great progress is being made in the academic sec
Autor:
Chien-Ying Chen, Michael E. Locasto, Tancrède Lepoint, Matteo Campanelli, Ulf Lindqvist, Ioannis Agadakos, Bogdan Copos, Monowar Hasan, Prashant Anantharaman, Gabriela F. Ciocarlie
Publikováno v:
CPS-SPC@CCS
The proliferation of Internet-of-Things (IoT) devices within homes raises many security and privacy concerns. Recent headlines highlight the lack of effective security mechanisms in IoT devices. Security threats in IoT arise not only from vulnerabili