Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 72) Show all publications
Martucci, L., Magnusson, J., Vehkajärvi, T. & Karlsson, J. (2026). The Cyber Range Lite: Lightweight Infrastructure for Training and Education. In: Lynette Drevin, Wai Sze Leung, Suné von Solms (Ed.), Proceedings-Information Security Education. Empowering People Through Information Security Education: . Paper presented at 17th IFIP WG 11.8 World Conference, WISE 2025, Maribor, Slovenia, May 21–23, 2025. (pp. 171-185). Springer, 742 IFIPAICT
Open this publication in new window or tab >>The Cyber Range Lite: Lightweight Infrastructure for Training and Education
2026 (English)In: Proceedings-Information Security Education. Empowering People Through Information Security Education / [ed] Lynette Drevin, Wai Sze Leung, Suné von Solms, Springer, 2026, Vol. 742 IFIPAICT, p. 171-185Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents the requirements, design, development, and evaluation of a container-based cyber range for cybersecurity training and education named Cyber Range Lite (CRL). CRL is a scalable, lightweight platform with well-defined interfaces tailored to educational contexts. Cybersecurity exercises, or challenges, are described using a YAML-based template and deployed via Docker container images, which simulate a networked environment with a large number of hosts orchestrated by Docker Swarm. Students access the system through WireGuard VPN tunnels. We initially tested CRL using jeopardy-style Capture The Flag (CTF) exercises, comprising independent challenges. We then extended it to a virtual network scenario where students must solve challenges in a prescribed sequence. CRL was deployed and evaluated in an advanced-level ethical hacking course, where we compared its functionality, cost, and student feedback against a previous cyber range implementation based on virtual machines hosted on the Google Cloud Platform. Our results indicate that CRL offers a cost-effective and pedagogically flexible alternative for hands-on cybersecurity education. 

Place, publisher, year, edition, pages
Springer, 2026
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X
Keywords
Containers, Curricula, Cybersecurity, E-learning, Education computing, Embedded systems, Ethical aspects, Human engineering, Network security, Personnel training, Students, Teaching, Cybe range, Cyber security, Cybersecurity exercise, Design development, Design evaluation, Educational context, Ethical hacking, Networked environments, Student access, Training and education, Cost effectiveness
National Category
Computer Systems Computer Sciences
Research subject
Computer Science; Computer Science
Identifiers
urn:nbn:se:kau:diva-106649 (URN)10.1007/978-3-031-94924-1_12 (DOI)001567411000012 ()2-s2.0-105012924478 (Scopus ID)978-3-031-94923-4 (ISBN)9783031949241 (ISBN)
Conference
17th IFIP WG 11.8 World Conference, WISE 2025, Maribor, Slovenia, May 21–23, 2025.
Available from: 2025-08-26 Created: 2025-08-26 Last updated: 2026-02-12Bibliographically approved
Alaqra, A. S., Kitkowska, A. & Martucci, L. (2025). AI in education: Pedagogical possibilities and challenges. In: Carina Vikström; Mikael Svanberg (Ed.), Bidrag från Högskolepedagogisk utvecklingsdag 2024: (pp. 31-46). Karlstad: Karlstads universitet
Open this publication in new window or tab >>AI in education: Pedagogical possibilities and challenges
2025 (Swedish)In: Bidrag från Högskolepedagogisk utvecklingsdag 2024 / [ed] Carina Vikström; Mikael Svanberg, Karlstad: Karlstads universitet, 2025, , p. 91p. 31-46Chapter in book (Other academic)
Abstract [en]

In this chapter, we present the pedagogical possibilities of AI as well as the challenges it poses in education. AI is not merely a new technological tool but represents a fundamental shift in how students interact with knowledge, assignments, and learning environments. As educators, we must navigate questions of academic integrity, skill development, and pedagogical alignment, as AI tools are increasingly becoming part of learning and assessment practices. We consider how AI can support learning and possibly replace traditional methods; however, concerns about overreliance, misinformation, and the erosion of critical thinking remain. We share examples based on examination instances, honesty statements, and our observations on the impact of these tools on the learning experiences of students at Karlstad University and Jönköping University. These insights stem from our recent experiences, as well as students’ reflections and behaviors. Finally, we share insights and takeaways for the future use of AI in teaching and assessment, emphasizing the importance of transparent communication, clear boundaries, and a pedagogical focus on learning outcomes.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2025. p. 91
Series
Utveckling av undervisning och examination i högre utbildning: utgiven av Universitetspedagogiska enheten vid Karlstads universitet ; 2025:2
National Category
Educational Sciences Gender Studies
Research subject
Gender Studies
Identifiers
urn:nbn:se:kau:diva-108950 (URN)978-91-7867-639-2 (ISBN)978-91-7867-640-8 (ISBN)
Available from: 2026-02-25 Created: 2026-02-25 Last updated: 2026-02-25Bibliographically approved
Bach, S., Jarlow, V., Brunstrom, A., Martucci, L. & Kero, T. (2025). Evaluating the Viability of Computational Offloading for Vehicles Under Adverse Network Conditions. In: 2025 IEEE International Automated Vehicle Validation Conference (IAVVC): . Paper presented at 2025 IEEE International Automated Vehicle Validation Conference (IAVVC), Baden-Baden, Germany, 2025. IEEE
Open this publication in new window or tab >>Evaluating the Viability of Computational Offloading for Vehicles Under Adverse Network Conditions
Show others...
2025 (English)In: 2025 IEEE International Automated Vehicle Validation Conference (IAVVC), IEEE, 2025Conference paper, Published paper (Refereed)
Abstract [en]

The safe and efficient operation of automated vehicles requires processing massive amounts of sensor data. However, the computational capabilities of vehicles are often limited. Recent results point to computational offloading as a promising solution for transferring raw sensor data to be processed elsewhere. This alleviates vehicles from performing costly computations while increasing their perception of complex environments. The work in this paper evaluates the resilience of such solutions, specifically focusing on adverse network conditions, which are often overlooked when evaluating computational offloading. To emulate adverse network conditions, we use synthetic network interference that includes, e.g., packet loss, throughput rate limiting, packet corruption, and RF attenuation. We conducted experiments with a real vehicle on a test track, where object detection was offloaded to an edge server. An optical camera, one of the most common perception sensors, was mounted on the vehicle to scan the environment. The experimental results indicate that network conditions can significantly impact the object detection performance. Packet loss and packet corruption proved to be especially impactful on the accuracy of detections. During the scenario of 5% packet corruption, the median value of false detections reached as high as 20%. The results emphasize the need for resilience and robustness to poor network conditions when designing computational offloading strategies. 

Place, publisher, year, edition, pages
IEEE, 2025
Keywords
computational offloading, connected vehicles, jamming, network conditions, object detection, packet loss, Computation offloading, Data handling, Edge detection, Object recognition, Vehicle detection, Vehicles, Automated vehicles, Complex environments, Computational capability, Connected vehicle, Network condition, Objects detection, Packets loss, Raw sensor, Sensors data, Synthetic networks
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-108126 (URN)10.1109/IAVVC61942.2025.11219480 (DOI)2-s2.0-105025115615 (Scopus ID)979-8-3315-2526-2 (ISBN)979-8-3315-2527-9 (ISBN)
Conference
2025 IEEE International Automated Vehicle Validation Conference (IAVVC), Baden-Baden, Germany, 2025
Available from: 2026-01-12 Created: 2026-01-12 Last updated: 2026-02-12Bibliographically approved
Iwaya, L. H., Kamm, L., Martucci, L. & Pulls, T. (Eds.). (2025). Secure IT Systems. Paper presented at 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 .. Springer, 15396 LNCS
Open this publication in new window or tab >>Secure IT Systems
2025 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6–7, 2024.

The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.

Place, publisher, year, edition, pages
Springer, 2025. p. 502
Series
NordSec: Nordic Conference on Secure IT Systems
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-104041 (URN)10.1007/978-3-031-79007-2 (DOI)2-s2.0-85218681141 (Scopus ID)978-3-031-79006-5 (ISBN)978-3-031-79007-2 (ISBN)
Conference
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 .
Available from: 2025-04-25 Created: 2025-04-25 Last updated: 2026-02-12Bibliographically approved
Akil, M., Naskar, S., Martucci, L. & Hoepman, J.-H. (2024). A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. In: Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering (Ed.), Privacy and Identity Management. Sharing in a Digital World: . Paper presented at 18th IFIP International Summer School, Privacy and Identity, Oslo, Norway, August 8–11, 2023. (pp. 192-210). Springer
Open this publication in new window or tab >>A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs
2024 (English)In: Privacy and Identity Management. Sharing in a Digital World / [ed] Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering, Springer, 2024, p. 192-210Conference paper, Published paper (Refereed)
Abstract [en]

Vehicular Ad Hoc Networks (VANETs) play a crucial rolein the evolution of Intelligent Transportation Systems. The problems ofrenting and drivers’ accountability still need to be answered in VANETs.Existing proposals do not consider renting vehicles, and there is nodistinction between renters and owners. This paper proposes privacy-preserving rental and accountability protocols to address these problems.The proposed rental protocol outputs an agreement between an ownerand a renter, which allows the renter to unlock and drive the vehicle.The privacy-preserving accountability protocol offers a robust solutionfor detecting and mitigating malicious behavior in VANETs. It provides aplatform for holding entities accountable for their actions without violating their privacy. The paper demonstrates that our solution successfullymeets the pre-set security and privacy requirements in VANETs. Thesefindings suggest promising potential for improving future vehicular networks’ safety, efficiency, and performance.

Place, publisher, year, edition, pages
Springer, 2024
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 695
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-97604 (URN)10.1007/978-3-031-57978-3_13 (DOI)001468250800013 ()2-s2.0-85192369838 (Scopus ID)978-3-031-57977-6 (ISBN)978-3-031-57978-3 (ISBN)
Conference
18th IFIP International Summer School, Privacy and Identity, Oslo, Norway, August 8–11, 2023.
Available from: 2023-11-30 Created: 2023-11-30 Last updated: 2026-02-12Bibliographically approved
Akil, M., Martucci, L. & Hoepman, J.-H. (2024). A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. In: Sabrina De Capitani Di Vimercati and Pierangela Samarati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT: . Paper presented at International Conference on Security and Cryptography, SECRYPT, Dijon, France, July 8-10, 2024. (pp. 114-127). SciTePress
Open this publication in new window or tab >>A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs
2024 (English)In: Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT / [ed] Sabrina De Capitani Di Vimercati and Pierangela Samarati, SciTePress, 2024, p. 114-127Conference paper, Published paper (Refereed)
Abstract [en]

Vehicular Ad-hoc Networks (VANETs) enable communications between vehicles and infrastructure and are a key part of future Intelligent Transportation Systems. Significant advancements have been made in ensuring anonymous and secure communication within VANETs; however, integrating privacy-preserving vehicle rentals in VANETS is an unsolved problem. Existing protocols do not address the unique challenges posed by vehicle sharing and rentals, particularly regarding vehicle owners’ and renters’ privacy. This paper proposes a novel rental protocol within VANETs. Our solution is based on delegatable anonymous credentials and NonInteractive Zero-Knowledge (NIZK) proofs. It allows drivers to securely delegate credentials to vehicles. This approach ensures that each vehicle broadcasts authenticated messages, verified through NIZK proofs, while the identity of the actual driver is verifiably escrowed to an inspector that can lift driver privacy in case of abuse. The latter property implements accountability into the system. Our protocol addresses the trust issues inherent in previous systems by providing a robust mechanism for privacy-preserving, accountable vehicle rentals in VANETs, enhancing the overall security and functionality of these networks.

Place, publisher, year, edition, pages
SciTePress, 2024
Keywords
Zero-Knowledge Proofs, Delegatable Anonymous Credentials, Vehicular Ad-Hoc Networks, Authentication Scheme.
National Category
Computer Sciences Communication Systems Telecommunications
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-101690 (URN)10.5220/0012759600003767 (DOI)2-s2.0-85202835904 (Scopus ID)978-989-758-709-2 (ISBN)
Conference
International Conference on Security and Cryptography, SECRYPT, Dijon, France, July 8-10, 2024.
Available from: 2024-09-24 Created: 2024-09-24 Last updated: 2026-02-12Bibliographically approved
Kitkowska, A., Shulman, Y., Martucci, L. & Wästlund, E. (2023). Designing for privacy: Exploring the influence of affect and individual characteristics on users’ interactions with privacy policies. Computers & Security, 134, Article ID 103468.
Open this publication in new window or tab >>Designing for privacy: Exploring the influence of affect and individual characteristics on users’ interactions with privacy policies
2023 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 134, article id 103468Article in journal (Refereed) Published
Abstract [en]

Consenting to digital services’ privacy policies is standard practice. It often occurs at the early stage of interactions with a given service—during the sign-up process. Still, the most common way of acquiring consent from users is through their acknowledgment of policies by ticking a box. Consequently, users consent, mostly blindly, as they are unlikely to review the full text of policies. The current article presents research investigating factors that may impact user interaction with privacy policies, focusing on the underresearched topic of affective states (valence and arousal). The results of an online experiment (N=88) indicate that privacy policy design can elicit specific affective responses and, when accounting for some characteristics of individuals (e.g., personality traits), it can influence users’ attitudes and behaviors. Particularly, the findings show that privacy awareness and willingness to disclose information might be impacted. Additionally, the analysis of collected data suggests significant associations between some personality traits and affective states, as well as a strong relationship between privacy concerns and willingness to disclose information, contradicting the concept of privacy paradox, often discussed in the privacy literature. Moreover, the results of our qualitative inquiry, where the study respondents had a chance to elaborate on their decisions to agree or disagree with the privacy policy by answering an open-ended question, confirm the quantitative findings, and reveal some of the users needs considering the sign-up process.

Place, publisher, year, edition, pages
Elsevier, 2023
Keywords
Affective state, Attitude and behavior, Decisions makings, Framing, Individual characteristics, Personality traits, Privacy, Privacy policies, User interaction, Visual cues, Decision making
National Category
Human Computer Interaction
Research subject
Psychology; Computer Science
Identifiers
urn:nbn:se:kau:diva-96857 (URN)10.1016/j.cose.2023.103468 (DOI)001081345600001 ()2-s2.0-85171144588 (Scopus ID)
Funder
EU, Horizon 2020, 675730
Available from: 2023-10-02 Created: 2023-10-02 Last updated: 2026-02-12Bibliographically approved
Akil, M., Martucci, L. & Hoepman, J.-H. (2023). Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs. In: Network and Distributed System Security (NDSS) Symposium: Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023). Paper presented at Symposium on Vehicles Security and Privacy (VehicleSec) 2023. 27 February, 2023, San Diego, CA, USA. Internet Society
Open this publication in new window or tab >>Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs
2023 (English)In: Network and Distributed System Security (NDSS) Symposium: Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023), Internet Society , 2023Conference paper, Published paper (Refereed)
Abstract [en]

In vehicular ad hoc networks (VANETs), vehicles exchange messages to improve traffic and passengers’ safety. In VANETs, (passive) adversaries can track vehicles (and their drivers) by analyzing the data exchanged in the network. The use of privacy-enhancing technologies can prevent vehicle tracking but solutions so far proposed either require an intermittent connection to a fixed infrastructure or allow vehicles to generate concurrent pseudonyms which could lead to identity-based (Sybil) attacks. In this paper, we propose an anonymous authentication scheme that does not require a connection to a fixed infrastructure during operation and is not vulnerable to Sybil attacks. Our scheme is built on attribute-based credentials and short lived pseudonyms. In it, vehicles interact with a central authority only once, for registering themselves, and then generate their own pseudonyms without interacting with other devices, or relying on a central authority or a trusted third party. The pseudonyms are periodically refreshed, following system wide epochs.

Place, publisher, year, edition, pages
Internet Society, 2023
National Category
Communication Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-94859 (URN)10.14722/vehiclesec.2023.23007 (DOI)1-891562-88-6 (ISBN)
Conference
Symposium on Vehicles Security and Privacy (VehicleSec) 2023. 27 February, 2023, San Diego, CA, USA
Available from: 2023-05-25 Created: 2023-05-25 Last updated: 2026-02-12Bibliographically approved
Martucci, L., Magnusson, J. & Akil, M. (2023). On-Campus Hands-On Ethical Hacking Course: Design, Deployment and Lessons Learned. In: Nathan Clarke; Steven Furnell (Ed.), Human Aspects of Information Security and Assurance: . Paper presented at IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2023) (pp. 76-90). Springer
Open this publication in new window or tab >>On-Campus Hands-On Ethical Hacking Course: Design, Deployment and Lessons Learned
2023 (English)In: Human Aspects of Information Security and Assurance / [ed] Nathan Clarke; Steven Furnell, Springer, 2023, p. 76-90Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we report on designing and deploying an on-campus, highly practical ethical hacking course   using the foundation of Kungl. Tekniska Högskolan's (KTH) existing, well-established, distance-based course. We explain our course organization, structure, and delivery and present the students' formative and summative feedback and their results. Moreover, we justify the choice of our platform, a custom GCP-based cyber range with twelve capture the flag exercises designed for an online ethical hacking course, and how our on-campus course was implemented around it. Our ethical hacking course is organized around ten mandatory lectures, seven flag reports and three lectures on ethics, two demonstrations, and four guest lectures. The student evaluation is continuous and based on the flags captured. Our collected data indicates the amount of effort spent on each exercise, the used hints, and for how long most of the students were actively solving the exercises. The students' feedback indicates they were overwhelmingly satisfied with the course elements and teaching staff. Finally, we propose changes to elements of our ethical hacking course. The course was delivered at Karlstad University over nine weeks between January and March 2023 for 24 students.

Place, publisher, year, edition, pages
Springer, 2023
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 674
Keywords
capture the flag, cybersecurity, education, Ethical hacking, ethics
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-96081 (URN)10.1007/978-3-031-38530-8_7 (DOI)2-s2.0-85172696761 (Scopus ID)978-3-031-38529-2 (ISBN)978-3-031-38530-8 (ISBN)
Conference
IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA 2023)
Funder
Karlstad University
Available from: 2023-07-11 Created: 2023-07-11 Last updated: 2026-02-12Bibliographically approved
Kitkowska, A., Warner, M., Shulman, Y., Wästlund, E. & Martucci, L. (2020). Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affe. In: Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020): . Paper presented at 16th Symposium on Usable Privacy and Security, SOUPS 2020; Virtual, Online; ; 10 August 2020 through 11 August 2020; (pp. 437-456).
Open this publication in new window or tab >>Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affe
Show others...
2020 (English)In: Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020, p. 437-456Conference paper, Published paper (Refereed)
Abstract [en]

When people sign-up to new online services, privacy notices are the initial means by which data handling practices are communicated. Yet, their design seldom ensures users' privacy comprehension or provides people with privacy choices, resulting in negative feelings associated with the sign-up process. In this paper, we investigate how to improve privacy notice design to enhance privacy comprehension and control, while inducing more positive feelings towards these notices. In an online experiment (N=620), we examine the factors of curiosity, privacy concerns, trust, and time. We study how these factors and visual designs of notices (framing and control) influence privacy comprehension, intention to disclose, and affect (negative-positive). Our results show that, depending on an individual's level of curiosity, control can influence privacy comprehension, disclosure, and affect. We demonstrate that affect moderates the relationship between privacy concerns and disclosure. We elaborate on our results, highlighting how privacy notices that activate curiosity and provide control, could enhance usability and strengthen privacy-conscious behaviors.

Keywords
privacy, HCI, decision-making, attitudes, behaviors, emotions, affect
National Category
Human Computer Interaction
Research subject
Psychology; Mathematics; Computer Science
Identifiers
urn:nbn:se:kau:diva-79314 (URN)10.5281/zenodo.3980478 (DOI)2-s2.0-85091858224 (Scopus ID)978-1-939133-16-8 (ISBN)
Conference
16th Symposium on Usable Privacy and Security, SOUPS 2020; Virtual, Online; ; 10 August 2020 through 11 August 2020;
Funder
EU, Horizon 2020, 675730
Available from: 2020-08-12 Created: 2020-08-12 Last updated: 2026-02-12Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9980-3473

Search in DiVA

Show all publications