Latest publications
Recent publications by the Division of Network and Systems Engineering.
The latest publications from NSE
[1]
Z. Liao et al.,
"A Bibliometric Analysis of Scientific Publications on Eating Disorder Prevention in the Past Three Decades,"
Nutrients, vol. 16, no. 8, 2024.
[2]
E. Shereen, K. Kazari and G. Dán,
"A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control,"
IEEE Transactions on Smart Grid, vol. 15, no. 1, pp. 959-972, 2024.
[3]
S. G. E. Gökstorp et al.,
"Anomaly Detection in Security Logs using Sequence Modeling,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[4]
A. Hasselberg et al.,
"Cliffhanger : An Experimental Evaluation of Stateful Serverless at the Edge,"
in 2024 19th Wireless On-Demand Network Systems and Services Conference, 2024, pp. 41-48.
[5]
Y. K. Tun et al.,
"Collaborative Computing Services at Ground, Air, and Space : An Optimization Approach,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 1, pp. 1491-1496, 2024.
[6]
F. S. Shahabsamani et al.,
"Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment,"
in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024 Seoul, South Korea, 2024.
[7]
F. S. Samani et al.,
"Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network Environment,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[8]
F. Heiding et al.,
"Devising and Detecting Phishing Emails Using Large Language Models,"
IEEE Access, vol. 12, pp. 42131-42146, 2024.
[9]
S. Katsikeas et al.,
"Empirical evaluation of a threat modeling language as a cybersecurity assessment tool,"
Computers & security (Print), vol. 140, 2024.
[10]
O. Viberg et al.,
"Exploring teachers' (future) digital assessment practices in higher education: Instrument and model development,"
British Journal of Educational Technology, 2024.
[11]
M. Bokaei et al.,
"Harmonic retrieval using weighted lifted-structure low-rank matrix completion,"
Signal Processing, vol. 216, 2024.
[12]
Y. You, Q. Xu and C. Fischione,
"Hierarchical Online Game-Theoretic Framework for Real-Time Energy Trading in Smart Grid,"
IEEE Transactions on Smart Grid, vol. 15, no. 2, pp. 1634-1645, 2024.
[13]
X. Wang and R. Stadler,
"IT Intrusion Detection Using Statistical Learning and Testbed Measurements,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[14]
F. Tütüncüoğlu and G. Dán,
"Joint Resource Management and Pricing for Task Offloading in Serverless Edge Computing,"
IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7438-7452, 2024.
[15]
Y. M. Park et al.,
"Joint Trajectory and Resource Optimization of MEC-Assisted UAVs in Sub-THz Networks : A Resources-Based Multi-Agent Proximal Policy Optimization DRL With Attention Mechanism,"
IEEE Transactions on Vehicular Technology, vol. 73, no. 2, pp. 2003-2016, 2024.
[16]
K. Hammar and R. Stadler,
"Learning Near-Optimal Intrusion Responses Against Dynamic Attackers,"
IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 1158-1177, 2024.
[17]
S. M. Azimi Abarghouyi and H. S. Dhillon,
"Matérn cluster process with holes at the cluster centers,"
Statistics and Probability Letters, vol. 204, 2024.
[18]
F. Shahabsamani, K. Hammar and R. Stadler,
"Online Policy Adaptation for Networked Systems using Rollout,"
in IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea, 2024.
[19]
F. S. Samani, K. Hammar and R. Stadler,
"Online Policy Adaptation for Networked Systems using Rollout,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, 2024.
[20]
W. Liu and P. Papadimitratos,
"Position-based Rogue Access Point Detection,"
in IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, Austria, July 8-12, 2024, 2024.
[21]
N. Korotkova, J. Lilliesköld and E. Hetemi,
"Pursuing Openness in the Digital Age : Insights from Client–Contractor Knowledge Collaboration at the Project Front End,"
International Journal of Project Management, vol. 42, no. 1, pp. 102564-102564, 2024.
[22]
F. Liljeblad and J. Lilliesköld,
"The digitalization and digital transformation of universities from the CIO perspective,"
in https://rnd2024.org/, 2024.
[23]
T. Nguyen Dang et al.,
"A Contract-Theory-Based Incentive Mechanism for UAV-Enabled VR-Based Services in 5G and Beyond,"
IEEE Internet of Things Journal, vol. 10, no. 18, pp. 16465-16479, 2023.
[24]
T. O. Timoudas et al.,
"A General Framework to Distribute Iterative Algorithms With Localized Information Over Networks,"
IEEE Transactions on Automatic Control, vol. 68, no. 12, pp. 7358-7373, 2023.
[25]
L. Varawala et al.,
"A generalised approach for efficient computation of look ahead security constrained optimal power flow,"
European Journal of Operational Research, 2023.
[26]
L. Varawala et al.,
"A pricing mechanism to jointly mitigate market power and environmental externalities in electricity markets,"
Energy Economics, vol. 121, pp. 106646-106646, 2023.
[27]
S. Raavikanti, S. Hacks and S. Katsikeas,
"A Recommender Plug-in for Enterprise Architecture Models,"
in Proceedings of the 25th International Conference on Enterprise Information Systems - Volume 2, ICEIS 2023, 2023, pp. 474-480.
[28]
D. Weinberg et al.,
"A Review of Reinforcement Learning for Controlling Building Energy Systems From a Computer Science Perspective,"
Sustainable cities and society, vol. 89, 2023.
[29]
C. Linse and J. Lilliesköld,
"A space for action : Ambiguity as abasis for creativity and innovation,"
in 30th IPDMC: Innovation and Product Development Management Conference, Lecco, Italy, June 7-9, 2023, 2023.
[30]
S. S. Mostafavi et al.,
"Active Queue Management with Data-Driven Delay Violation Probability Predictors,"
in GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2023, pp. 6371-6376.
[31]
E. Shereen, K. Kazari and G. Dán,
"Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids,"
in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, 2023.
[32]
V. Sachidananda et al.,
"APTer : Towards the Investigation of APT Attribution,"
in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[33]
S. Daei et al.,
"Blind Asynchronous Goal-Oriented Detection for Massive Connectivity,"
in 2023 21st International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2023, 2023, pp. 167-174.
[34]
M. Balliu et al.,
"Challenges of Producing Software Bill of Materials for Java,"
IEEE Security and Privacy, vol. 21, no. 6, pp. 12-23, 2023.
[35]
S. Razavikia, J. M. B. Da Silva and C. Fischione,
"ChannelComp : A General Method for Computation by Communications,"
IEEE Transactions on Communications, pp. 1-1, 2023.
[36]
S. Razavikia, J. M. Barros da Silva Jr. and C. Fischione,
"Computing Functions Over-the-Air Using Digital Modulations,"
in ICC 2023 : IEEE International Conference on Communications: Sustainable Communications for Renaissance, 2023, pp. 5780-5786.
[37]
K. Kazari, E. Shereen and G. Dán,
"Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning,"
in Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, 2023, pp. 162-170.
[38]
P. S. Aung et al.,
"Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[39]
K. Kim et al.,
"Deep Reinforcement Learning for Channel Estimation in RIS-Aided Wireless Networks,"
IEEE Communications Letters, vol. 27, no. 8, pp. 2053-2057, 2023.
[40]
F. S. Samani, K. Hammar and R. Stadler,
"Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[41]
L. X. Nguyen et al.,
"Dependency Tasks Offloading and Communication Resource Allocation in Collaborative UAV Networks : A Metaheuristic Approach,"
IEEE Internet of Things Journal, vol. 10, no. 10, pp. 9062-9076, 2023.
[42]
M. Spanghero and P. Papadimitratos,
"Detecting GNSS misbehavior leveraging secure heterogeneous time sources,"
in IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, 2023.
[43]
P. Shahrivar, S. Millar and E. Shereen,
"Detecting Web Application DAST Attacks with Machine Learning,"
in Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, 2023.
[44]
R. Ramakrishna et al.,
"Differential Privacy for Class-Based Data : A Practical Gaussian Mechanism,"
IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5096-5108, 2023.
[45]
K. Hammar and R. Stadler,
"Digital Twins for Security Automation,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[46]
F. Liljeblad, J. Lilliesköld and E. Hetemi,
"Digitalization in an academic organization : Insights from a case study at a Swedish university,"
in European Academy of Management Conference (EURAM) 2023, Dublin, Ireland, 14-16 June 2023, 2023.
[47]
Y. Xu et al.,
"Distributed Assignment With Load Balancing for DNN Inference at the Edge,"
IEEE Internet of Things Journal, vol. 10, no. 2, pp. 1053-1065, 2023.
[48]
C. Barreto et al.,
"Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime,"
Computers & security (Print), vol. 131, pp. 1-16, 2023.
[49]
L. Zou et al.,
"Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation Design,"
in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, 2023.
[50]
E. Rencelj Ling and M. Ekstedt,
"Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data,"
SN Computer Science, vol. 4, no. 3, 2023.