My current research focuses on the design of tunable and adaptable security services as well as on security and performance analysis of security services and communication protocols. I have been actively involved in the design, implementation, and analysis of a number of tunable security services. I have also studied decision support for operator-centric and adaptive intrusion detection data collection.
- Green Computing, 7.5 ECTS
- Real-Time Systems, 7.5 ECTS
Research project: High Quality Networked Services in a Mobile World (HITS)
Stefan Lindskog (1967) received his Licentiate and PhD degrees in Computer Engineering from Chalmers University of Technology, Göteborg, Sweden in 2000 and 2005, respectively. In 2008, he received the Docent degree in Computer Science at Karlstad University, Karlstad, Sweden. He joined the Department of Computer Science at Karlstad University, Sweden in 1990, where he is currently a full Professor. His research focus is on the design of tunable and adaptable security services and security and performance analysis of security services and protocols. He has authored/co-authored one textbook, eight book chapters, and over 50 journal and conference papers.
- Zeeshan Afzal and Stefan Lindskog. “Multipath TCP IDS Evasion and Mitigation”. In Proceedings of the Information Security Conference (ISC 2015), pages 265–282, Trondheim, Norway, September 9–11, 2015. Lecture Notes in Computer Science (LNCS), volume 9290, Springer-Verlag Berlin Heidelberg.
- Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, and Edgar Weippl. “Spoiled Onions: Exposing Malicious Tor Exit Relays”. In Proceedings of The 14th Privacy Enhancing Technologies Symposium (PETS 2014), pages 304–331, Amsterdam, The Netherlands, July 16–18, 2014. Lecture Notes in Computer Science (LNCS), volume 8555, Springer-Verlag Berlin Heidelberg.
- Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog. “Performance Analysis and Improvement of PR-SCTP for Small Messages”. Computer Networks, volume 57, issue 18, Pages 3967–3986, Elsevier, December 2013.
- Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “Performance Evaluation of IKEv2 Authentication Methods in Next Generation Wireless Networks”. Journal of Security and Communication Networks, volume 3, issue 1, pages 83–98, Wiley, January/February 2010.