Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Doney Abraham

  1. Sule Yildirim Yayilgan, Filip Holik, Mohamed Abomhara, Doney Abraham, Alemayehu Gebremedhin. A Comprehensive Methodology for Analyzing Cyber Security Threats and Attacks in IoT based Power Networks: A Case Study of Digital Substation in Norway (PUBLICATION IS UNDER REVIEW)
  2. Filip Holik, Doney Abraham, Sule Yildirim Yayilgan. Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations
  3. Doney Abraham, Sule Yildirim Yayilgan, Mohamed Abomhara, Alemayehu Gebremedhin, Fisnik Dalipi. Security and Privacy issues in IoT based Smart Grids: A case study in a digital substation

Aida Akbarzadeh

  1. Aida Akbarzadeh, Sokratis Katsikas. Unified IT&OT Modeling for Cybersecurity Analysis of Cyber-Physical Systems

Ahmed Amro

  1. Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Navigation Data Anomaly Analysis and Detection

Martha Norberg Hovd

  1. Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum. On the IND-CCA1 Security of FHE Schemes

Livinus Obiora Nweke

  1. Livinus Obiora Nweke. Using Formal Methods for Modelling Cyber-Physical Systems Security
  2. Livinus Obiora Nweke, Mohamed Abomhara, Sule Yildirim Yayilgan, Debora Camparin, Olivier Heurtier, Calum Bunney. A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
  3. Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen. Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466))
  4. Livinus Obiora Nweke, Anthony Junior Bokolo, Gibson Mba, Emeka Nwigwe. Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study

Aybars Oruc

  1. Aybars Oruc. Ethical Considerations in Maritime Cybersecurity Research
  2. Aybars Oruc. Tools for Organizing an Effective Virtual Academic Conference
  3. Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Navigation Data Anomaly Analysis and Detection
  4. Aybars Oruc. Potential Cyber Threats, Vulnerabilities, and Protections of Unmanned Vehicles
  5. Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Towards a Cyber-Physical Range for the Integrated Navigation System

Muhammad Mudassar Yamin

  1. Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt, Mohammad Hijji, Khan Muhammad. Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
  2. Muhammad Mudassar Yamin, Espen Torseth, Laszlo Erdodi, Basel Katt. Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
  3. Muhammad Mudassar Yamin. COVID Truthers Have Found a New ‘Pandemic’ to Freak Out About
  4. Muhammad Mudassar Yamin. Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges
  5. Muhammad Mudassar Yamin, Basel Katt. Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges

Grethe Østby

  1. Grethe Østby, Stewart James Kowalski. Introducing Serious Games as a Master Course in Information Security Management Programs: Moving Towards Socio-Technical Incident Response Learning