liu.seSearch for publications in DiVA
Endre søk
Link to record
Permanent link

Direct link
Nadjm-Tehrani, Simin, ProfessorORCID iD iconorcid.org/0000-0002-1485-0802
Alternativa namn
Publikasjoner (10 av 143) Visa alla publikasjoner
Colaco, V. & Nadjm-Tehrani, S. (2025). Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems. In: 16th IEEE Vehicular Networking Conference (VNC): . Paper presented at 2025 IEEE Vehicular Networking Conference (VNC), Porto, Portugal, JUN 02-04, 2025. IEEE
Åpne denne publikasjonen i ny fane eller vindu >>Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems
2025 (engelsk)Inngår i: 16th IEEE Vehicular Networking Conference (VNC), IEEE, 2025Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Safety-critical functions in modern vehicles rely on electronic control units that communicate using the controller area network (CAN) protocol, which lacks vital security features. In this context, machine learning (ML) based intrusion detection systems (IDSs) were proposed as a solution to improve cyber resilience through real-time attack detection. However, these ML-IDSs must also withstand evasion attacks that could compromise vehicular safety. To this end, this paper addresses such attacks in misuse-based tree ensemble IDSs and proposes a method that detects evasion attempts. It uses the ordered set of reached leaf nodes activated by correctly classified training samples as a normality baseline. An autoencoder-based detector then identifies deviations as likely evasion attempts. Our approach does not modify the protected tree ensemble IDS, assumes no knowledge of the process for generating adversarial examples (ensuring generalisability), and works with any additive tree ensemble. We also prove that it is mathematically equivalent to the state-of-the-art, which we advance in terms of detection speed by replacing its Hamming distance-based deviation search with an autoencoder-based model of typical predictive behavior trained using our custom loss function. This enhancement results in a detection process that is orders of magnitude faster. Additionally, our method offers nuanced insights regarding the pre-evasion attack signature prior to the adversarial perturbation, thereby enriching the security analysis of the features targeted during evasion attempts. The prototype system we present, called Maverick, has a very low prediction latency, making it 85-563x faster than the current state-of-the-art while maintaining identical detection accuracy. Finally, Maverick predicts the pre-evasion attack signatures of the evasion samples with an accuracy of more than 93% and has an average prediction time well below the message transmission rate for CAN 2.0 and CAN FD, thereby satisfying the criteria for an evasion-hardened & real-time automotive IDS.

sted, utgiver, år, opplag, sider
IEEE, 2025
Serie
IEEE Vehicular Networking Conference, ISSN 2157-9857, E-ISSN 2157-9865
Emneord
Tree Ensembles, Autoencoders, Intrusion Detection Systems, Real-time Systems, Safety, Security, Controller Area Networks, Adversarial Examples
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-216350 (URN)10.1109/VNC64509.2025.11054177 (DOI)001540461700039 ()2-s2.0-105010777746 (Scopus ID)9798331524371 (ISBN)9798331524388 (ISBN)
Konferanse
2025 IEEE Vehicular Networking Conference (VNC), Porto, Portugal, JUN 02-04, 2025
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Merknad

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Tilgjengelig fra: 2025-08-14 Laget: 2025-08-14 Sist oppdatert: 2025-11-13
Colaco, V. & Nadjm-Tehrani, S. (2024). Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems. In: 2024 IEEE 36TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI: . Paper presented at 2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, OCT 28-30, 2024 (pp. 404-412). Institute of Electrical and Electronics Engineers (IEEE)
Åpne denne publikasjonen i ny fane eller vindu >>Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems
2024 (engelsk)Inngår i: 2024 IEEE 36TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, Institute of Electrical and Electronics Engineers (IEEE) , 2024, s. 404-412Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Intrusion Detection Systems (IDSs) can help bolster cyber resilience in high-risk systems by promptly detecting anomalies and thwarting security threats which could have catastrophic consequences. While Machine Learning (ML) techniques like Tree Ensembles are well suited for tasks like detecting anomalies, the widespread adoption of these techniques in IDSs faces barriers due to the threat of evasion attacks. Moreover, ML-based IDSs are susceptible to producing a high rate of false positive alerts during detection, causing alert fatigue. To alleviate these problems, we present a method that uses counterexample regions to detect evasion attacks in tree-ensemble-based IDSs. We generate these counterexample regions by defining a modified mapping checker in VoTE, a fast & scalable formal verification tool specialized for tree ensembles. Our method also provides quaternary annotations, empowering security managers with nuanced insights to better handle alerts in the triage queue. Our approach does not require training a separate model and displays good detection performance (≥98 %) in both adversarial & non-adversarial scenarios in four real-world case studies when compared to several approaches in the literature. The prototype system we implement based on our method called Iceman has a very low prediction latency, making it 5-115x faster than the current state-of-the-art in evasion detection for tree ensembles. Finally, empirical evaluations show that Iceman can correctly re-annotate the samples in the presence of evasion attacks for alert management purposes with an accuracy of more than 98 % .

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE), 2024
Serie
Proceedings-International Conference on Tools With Artificial Intelligence, ISSN 1082-3409, E-ISSN 2375-0197
Emneord
Evasion Attacks; Adversarial Defences; Intrusion Detection Systems; Tree Ensembles; Formal Methods
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-211768 (URN)10.1109/ICTAI62512.2024.00065 (DOI)001447778900056 ()2-s2.0-85217421895 (Scopus ID)9798331527242 (ISBN)9798331527235 (ISBN)
Konferanse
2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, OCT 28-30, 2024
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Merknad

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Tilgjengelig fra: 2025-02-20 Laget: 2025-02-20 Sist oppdatert: 2025-11-13
Sivaraman, N., Nadjm-Tehrani, S. & Johansson, T. (2024). Formal Analysis of Julia Key Agreement Protocol. In: 26th International Conference, ICICS 2024, Proceedings, Part II: . Paper presented at 26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024. Springer Nature
Åpne denne publikasjonen i ny fane eller vindu >>Formal Analysis of Julia Key Agreement Protocol
2024 (engelsk)Inngår i: 26th International Conference, ICICS 2024, Proceedings, Part II, Springer Nature, 2024Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The evolution of the fifth-generation network (5G) increases the demand and use of Internet of Things (IoT) devices extensively. The increased number of IoT devices increases the possibility of new attack surfaces, and thus even resource-constrained IoT devices need secure communication. In this work, we consider the Julia Key Agreement (JKA) protocol, which has been proposed as a secure and efficient protocol for communication among resource-constrained IoT devices. We formally model two variants of the JKA protocol and verify the intended security requirements, such as mutual authentication, forward secrecy, backward secrecy, and resilience to key impersonation attacks, using the Tamarin prover. Our formal analysis shows that the JKA protocol is susceptible to replay attacks under the Dolev-Yao threat model. We also expand the threat model by including several strong threat assumptions to discover interesting attack vectors.

sted, utgiver, år, opplag, sider
Springer Nature, 2024
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 15057
Emneord
Key Agreement protocol, IoT security, Formal verification, Tamarin
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-211016 (URN)10.1007/978-981-97-8801-9_9 (DOI)001531804300009 ()2-s2.0-85215327330 (Scopus ID)9789819788002 (ISBN)9789819788019 (ISBN)
Konferanse
26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024
Merknad

Funding Agencies|ELLIIT, Excellence Center at Linkoping-Lund on Information Technology; Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Tilgjengelig fra: 2025-01-16 Laget: 2025-01-16 Sist oppdatert: 2025-09-05
Colaco, V. & Nadjm-Tehrani, S. (2023). Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations. In: Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J. (Ed.), Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023): . Paper presented at The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023. CEUR-WS, 3381, Article ID 38.
Åpne denne publikasjonen i ny fane eller vindu >>Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations
2023 (engelsk)Inngår i: Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023) / [ed] Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J., CEUR-WS , 2023, Vol. 3381, artikkel-id 38Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Since machine learning components are now being considered for integration in safety-critical systems, safety stakeholdersshould be able to provide convincing arguments that the systems are safe for use in realistic deployment settings. In the caseof vision-based systems, the use of tree ensembles calls for formal stability verification against a host of composite geometricperturbations that the system may encounter. Such perturbations are a combination of an affine transformation like rotation,scaling, or translation and a pixel-wise transformation like changes in lighting. However, existing verification approachesmostly target small norm-based perturbations, and do not account for composite geometric perturbations. In this work,we present a novel method to precisely define the desired stability regions for these types of perturbations. We propose afeature space modelling process that generates abstract intervals which can be passed to VoTE, an efficient formal verificationengine that is specialised for tree ensembles. Our method is implemented as an extension to VoTE by defining a new propertychecker. The applicability of the method is demonstrated by verifying classifier stability and computing metrics associatedwith stability and correctness, i.e., robustness, fragility, vulnerability, and breakage, in two case studies. In both case studies,targeted data augmentation pre-processing steps were applied for robust model training. Our results show that even modelstrained with augmented data are unable to handle these types of perturbations, thereby emphasising the need for certifiedrobust training for tree ensembles.

sted, utgiver, år, opplag, sider
CEUR-WS, 2023
Serie
CEUR Workshop Proceedings, ISSN 1613-0073 ; 3381
Emneord
Machine Learning, Formal Verification, Tree Ensembles, Composite Perturbations, Geometric Perturbations, Random Forests, Gradient Boosting Machines, Semantic Perturbations, Stability, Robustness, Trustworthy AI, Trustworthy Computing
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-195996 (URN)2-s2.0-85159287306 (Scopus ID)
Konferanse
The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023
Forskningsfinansiär
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Tilgjengelig fra: 2023-06-30 Laget: 2023-06-30 Sist oppdatert: 2025-11-13bibliografisk kontrollert
Eckhart, M., Ekelhart, A., Allison, D., Almgren, M., Ceesay-Seitz, K., Janicke, H., . . . Yampolskiy, M. (2023). Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Security and Privacy, 21(6), 64-75
Åpne denne publikasjonen i ny fane eller vindu >>Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
Vise andre…
2023 (engelsk)Inngår i: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 21, nr 6, s. 64-75Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

sted, utgiver, år, opplag, sider
IEEE COMPUTER SOC, 2023
Emneord
Security; Behavioral sciences; Emulation; Testing; Mathematical models; Network systems; Digital twins
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-195770 (URN)10.1109/MSEC.2023.3271225 (DOI)001005921400001 ()
Merknad

Funding Agencies|Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK); Federal Ministry for Labor and Economy (BMAW); federal state of Vienna; FFG via the BRIDGE 1 program [880609]; CDL-SQI; Christian Doppler Research Association; Austrian Federal Ministry for Digital and Economic Affairs; National Foundation for Research, Technology and Development; RICS Center on Resilient Information; Swedish Civil Contingencies Agency (MSB); U.S. Department of Commerce; National Institute of Standards and Technology [NIST-70NANB21H121, NIST-70NANB19H170]

Tilgjengelig fra: 2023-06-27 Laget: 2023-06-27 Sist oppdatert: 2024-10-10bibliografisk kontrollert
Toczé, K., Fahs, A. J., Pierre, G. & Nadjm-Tehrani, S. (2023). VioLinn: Proximity-aware Edge Placement with Dynamic and Elastic Resource Provisioning. ACM TRANSACTIONS ON INTERNET OF THINGS, 4(1), Article ID 7.
Åpne denne publikasjonen i ny fane eller vindu >>VioLinn: Proximity-aware Edge Placement with Dynamic and Elastic Resource Provisioning
2023 (engelsk)Inngår i: ACM TRANSACTIONS ON INTERNET OF THINGS, E-ISSN 2577-6207, Vol. 4, nr 1, artikkel-id 7Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Deciding where to handle services and tasks, as well as provisioning an adequate amount of computing resources for this handling, is a main challenge of edge computing systems. Moreover, latency-sensitive services constrain the type and location of edge devices that can provide the needed resources. When available resources are scarce there is a possibility that some resource allocation requests are denied. In this work, we propose the VioLinn system to tackle the joint problems of task placement, service placement, and edge device provisioning. Dealing with latency-sensitive services is achieved through proximityaware algorithms that ensure the tasks are handled close to the end-user. Moreover, the concept of spare edge device is introduced to handle sudden load variations in time and space without having to continuously over-provision. Several spare device selection algorithms are proposed with different cost/performance tradeoffs. Evaluations are performed both in a Kubernetes-based testbed and using simulations and show the benefit of using spare devices for handling localized load spikes with higher quality of service (QoS) and lower computing resource usage. The study of the different algorithms shows that it is possible to achieve this increase in QoS with different tradeoffs against cost and performance.

sted, utgiver, år, opplag, sider
ASSOC COMPUTING MACHINERY, 2023
Emneord
Edge/fog computing; resource management; Kubernetes; elasticity
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-193143 (URN)10.1145/3573125 (DOI)000949035400007 ()2-s2.0-85150308341 (Scopus ID)
Merknad

Funding Agencies|CUGS national graduate school; ELLIIT strategic research area; IRISA collaboration from Rennes Metropole

Tilgjengelig fra: 2023-04-18 Laget: 2023-04-18 Sist oppdatert: 2025-10-02bibliografisk kontrollert
Saar de Moraes, R. & Nadjm-Tehrani, S. (2022). Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements. In: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022: . Paper presented at ICAS2022, Stockholm, Sweden, 4-9 September, 2022 (pp. 1700-1710). International Council of the Aeronautical Sciences
Åpne denne publikasjonen i ny fane eller vindu >>Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements
2022 (engelsk)Inngår i: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022, International Council of the Aeronautical Sciences , 2022, s. 1700-1710Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper, we apply a grammar-based approach to generate computation and communication platforms for avionic applications with mixed classes of time-sensitive communication messages. Then, we propose an evolutionary algorithm to schedule communication in the platform considering the interaction between timetriggered and bandwidth-constrained traffic. Together, the platform generation approach and the scheduling algorithm support the exploration of avionic systems at the concept level.

sted, utgiver, år, opplag, sider
International Council of the Aeronautical Sciences, 2022
Serie
ICAS proceedings, ISSN 2958-4647 
Emneord
platform architecture exploration; time-sensitive networks; mixed-critical communication; communication scheduling; timeliness analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-203165 (URN)2-s2.0-85159656333 (Scopus ID)9781713871163 (ISBN)
Konferanse
ICAS2022, Stockholm, Sweden, 4-9 September, 2022
Tilgjengelig fra: 2024-04-30 Laget: 2024-04-30 Sist oppdatert: 2025-01-31bibliografisk kontrollert
Lin, C.-Y. & Nadjm-Tehrani, S. (2021). A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. In: Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica (Ed.), Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers. Paper presented at International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (pp. 207-223). Springer
Åpne denne publikasjonen i ny fane eller vindu >>A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks
2021 (engelsk)Inngår i: Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers / [ed] Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica, Springer, 2021, s. 207-223Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Supervisory and Data Acquisition (SCADA) systems control and monitor modern power networks. As attacks targeting SCADA systems are increasing, significant research is conducted to defend SCADA networks including variations of anomaly detection. Due to the sensitivity of real data, many defence mechanisms have been tested only in small testbeds or emulated traffic that were designed with assumptions on how SCADA systems behave. This work provides a timing characterization of IEC-104 spontaneous traffic and compares the results from emulated traffic and real traffic to verify if the network characteristics appearing in testbeds and emulated traffic coincide with real traffic. Among three verified characteristics, two of them appear in the real dataset but in a less regular way, and one does not appear in the collected real data. The insights from these observations are discussed in terms of presumed differences between emulated and real traffic and how those differences are generated.

sted, utgiver, år, opplag, sider
Springer, 2021
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
Emneord
SCADA, Traffic characterization, IEC-104, Timing analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-189696 (URN)10.1007/978-3-030-69781-5_14 (DOI)2-s2.0-85102736813 (Scopus ID)9783030697808 (ISBN)9783030697815 (ISBN)
Konferanse
International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Forskningsfinansiär
Swedish Civil Contingencies Agency
Tilgjengelig fra: 2022-11-03 Laget: 2022-11-03 Sist oppdatert: 2024-08-27
Saar de Moraes, R., Bernardi, S. & Nadjm-Tehrani, S. (2021). A model-based approach for analysing network communication timeliness in IMA systems at concept level. In: Proceedings of the 29th International Conference on Real-Time Networks and Systems: . Paper presented at RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021 (pp. 78-88). Association for Computing Machinery
Åpne denne publikasjonen i ny fane eller vindu >>A model-based approach for analysing network communication timeliness in IMA systems at concept level
2021 (engelsk)Inngår i: Proceedings of the 29th International Conference on Real-Time Networks and Systems, Association for Computing Machinery , 2021, s. 78-88Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Analyzing the resource adequacy of complex cyber-physical systems at concept development stage can be a challenging task since there are a lot of uncertainties about the system at this stage. In Integrated Modular Avionics (IMA) systems, with a life-cycle over several decades and potential functionality changes, we need to estimate resource needs at the early stage but leave capacity to absorb future modifications. Given an envisaged set of functions and a mapping to a candidate platform, one needs to assure that the selected network configuration will provide adequate resources to meet communication timeliness. In particular, whether the set of switches, the topology, and the available bandwidth are sufficient to meet the envisaged needs. In this paper, timeliness requirements are expressed as constraints on the freshness of data and a strict bounding of end-to-end latency. We support generation of UML/MARTE-based specifications by creating a domain-specific meta-model for IMA systems and a resource modelling approach for the study of time-critical systems. The instances of this model then specify the application requirements and various network configurations that can be formally analyzed. We present a tool, M2NC, for automatic derivation of a network calculus model through model transformation, and use the state-of-art NC tools for deriving the bounds for end-to-end timeliness. The approach is illustrated on an example avionics case study, consisting of 91 computational processes that exchange 629 different types of messages. The results of the analysis show that our approach can efficiently provide feedback on configurations that are compliant with the requirements imposed by the application and the toolchain provides a systematic mechanism to quickly identify potential future bottlenecks.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, 2021
Serie
RTNS ’21
Emneord
UML-MARTE, Real-Time Systems, Network Resource Adequacy, Model Verification, Concept Analysis
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-203160 (URN)10.1145/3453417.3453427 (DOI)000933139900008 ()9781450390019 (ISBN)
Konferanse
RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021
Merknad

Funding: This work was supported by the Swedish Governmental Agency for Innovation Systems- Vinnova, as part of the national projects on aeronautics, NFFP7, project CLASSICS (NFFP7 2017-04890). Simona Bernardi was partially supported by the project Medrese (RTI2018098543-B-I00) by the Spanish Ministry of Science, Innovation and Universities.

Tilgjengelig fra: 2024-04-30 Laget: 2024-04-30 Sist oppdatert: 2024-11-22
Toczé, K. & Nadjm-Tehrani, S. (2021). Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018). Wireless Communications & Mobile Computing, 2021, Article ID 9876126.
Åpne denne publikasjonen i ny fane eller vindu >>Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018)
2021 (engelsk)Inngår i: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2021, artikkel-id 9876126Artikkel i tidsskrift (Annet vitenskapelig) Published
Abstract [en]

n/a

sted, utgiver, år, opplag, sider
Wiley Hindawi, 2021
HSV kategori
Identifikatorer
urn:nbn:se:liu:diva-184115 (URN)10.1155/2021/9876126 (DOI)000770932000008 ()
Tilgjengelig fra: 2022-04-11 Laget: 2022-04-11 Sist oppdatert: 2022-06-20
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-1485-0802