Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara. Investigation of user scenarios with focus on providing secure and privacy-respecting IoT environments
  2. Mohamed Ali Saleh Abomhara. Secure and privacy-respecting IoT environments

Waqas Aman

  1. Waqas Aman, Einar Snekkenes. An Empirical Research on InfoSec Risk Management in IoT-based eHealth
  2. Aman Waqas. Modeling Adaptive Security in IoT Driven eHealth

Maria Bartnes

  1. Maria Bartnes Line. Smarte strømmålere – smartere hackere?
  2. Maria Bartnes Line. Hackere kan kutte strømmen
  3. Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line. Threat Modeling of AMI
  4. Maria Bartnes Line. IKT-sikkerhet og risiko ved innføring av AMS og Smart Grids
  5. Maria Bartnes Line. A Study of Resilience within Information Security in the Power Industry
  6. Maria Bartnes Line. Resilience within Information Security in the Power Industry
  7. Maria Bartnes Line. Håndtering av IKT-hendelser – et case-studie i kraftbransjen
  8. Maria Bartnes Line. Smarte strømmålere skal redde kraftnettet
  9. Maria Bartnes Line. Oljeindustrien skal hackes av Anonymous
  10. Maria Bartnes Line. A Case Study: Preparing for the Smart Grids – Identifying Current Practice for Information Security Incident Management in the Power Industry
  11. Maria Bartnes Line. A Case Study: Preparing for the Smart Grids – Identifying Current Practice for Information Security Incident Management in the Power Industry
  12. Maria Bartnes Line. Må vente oss enda flere angrepsmetoder
  13. Per Håkon Meland, Erlend Andreas Gjære, Åsmund Ahlmann Nyre, Inger Anne Tøndel, Martin Gilje Jaatun, Maria Bartnes Line, Jostein Jensen, Karin Bernsmed. Infosec – Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT
  14. Maria Bartnes Line. Preparing for the Smart Grids: Improving Information Security Management in the Power Industry

Antorweep Chakravorty

  1. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  3. Chunming Rong, Quan Zhou, Antorweep Chakravorty. On Access Control Schemes for Hadoop Data Storage
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. Privacy Preserving Data Analytics for Smart Homes
  6. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk. A map reduce based K-anonymization solution for sharing of smart home data
  7. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. Privacy Preserving Data Analytics for Smart Homes

Samson Gejibo

  1. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Daniele Grasso. Secure cloud storage for remote mobile data collection

Håkon Jacobsen

  1. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev. McEliece in the world of Escher
  2. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev. McEliece in the world of Escher
  3. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski. On the strong and weak keys in MQQ-SIG

Oleksandr Kazymyrov

  1. Oleksandr Kazymyrov, Valentyna Kazymyrova, Roman Oliynykov. A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent
  2. Oleksandr Kazymyrov, Valentyna Kazymyrova. Extended Criterion for Absence of Fixed Points
  3. Oleksandr Kazymyrov, Valentyna Kazymyrova. Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012
  4. Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa. State space cryptanalysis of the MICKEY cipher

Kjetil Kjernsmo

  1. Kjetil Kjernsmo. Merits of Hypermedia Systems
  2. Kjetil Kjernsmo. Merits of Hypermedia Systems
  3. Kjetil Kjernsmo, John Sølve Tyssedal. Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation
  4. Kjetil Kjernsmo, John Sølve Tyssedal. Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation

Chunlei Li

  1. Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu. Permutation polynomials with low differential uniformity over finite fields of odd characteristic
  2. Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li. A family of quadriphase sequences of period 4(2 n−1)with low correlation and large linear span

Guoqiang Li

  1. Guoqiang Li, Bian Yang, Christoph Busch. Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
  2. Guoqiang Li, Bian Yang, Christoph Busch. Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
  3. Bian Yang, Guoqiang Li, Christoph Busch. Qualifying fingerprint samples captured by smartphone cameras
  4. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch. Quality Assessment for Fingerprints Collected by Smartphone Cameras

Yan Li

  1. Gencer Erdogan, Fredrik Seehusen, Yan Li. An Evaluation of a Test-driven Security Risk Analysis Method Based on an Industrial Case Study
  2. Yan Li, Ragnhild Kobro Runde, Ketil Stølen. Towards a pattern language for security risk analysis of web applications
  3. Yan Li. Towards a Pattern Language for Security Risk Analysis of Web Applications

Yi-Ching Liao

  1. Yi-Ching Liao, Hanno Langweg. A Survey of Process Activity Tracking Systems

Jayson Mackie

  1. Simon McCallum, Jayson Mackie. WebTics: A Web Based Telemetry and Metrics System for Small and Medium Games

Soumik Mondal

  1. Patrick Bours, Soumik Mondal. Continuous Authentication using Behavioural Biometrics
  2. Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus. Complexity measurement of a password for keystroke dynamics: preliminary study
  3. Soumik Mondal, Patrick Bours. Continuous Authentication using Mouse Dynamics

Martin Aastrup Olsen

  1. Martin Aastrup Olsen, Elham Tabassi, Anton Makarov, Christoph Busch. Self-Organizing Maps for Fingerprint Image Quality Assessment
  2. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch. Quality Assessment for Fingerprints Collected by Smartphone Cameras

Ebenezer Paintsil

  1. Ebenezer Paintsil. Risk Methods and Tools for Identity Management Systems Deliverable D3.1 in Petweb II
  2. Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes. Privacy and Security Risks Analysis of Identity Management Systems
  3. Ebenezer Paintsil, Lothar Fritsch. Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets
  4. Ebenezer Paintsil, Lothar Fritsch. Executable Model-Based Risk Assessment Method for Identity Management Systems

Pankaj Pandey

  1. Pankaj Pandey. Multimodal Biometrics Authentication Framework for Banking Systems
  2. Pankaj Pandey, Einar Snekkenes. A Framework for Comparison and Analysis of Information Security Investment Models

Anika Pflug

  1. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch. 3D face reconstruction and multimodal person identification from video captured using smartphone camera

Lisa Rajbhandari

  1. Lisa Rajbhandari, Einar Snekkenes. Case Study Role Play for Risk Analysis Research and Training
  2. Lisa Rajbhandari. Consideration of Opportunity and Human Factors: Required Paradigm Shift for Information Security Risk Management
  3. Lisa Rajbhandari, Einar Snekkenes. Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
  4. Lisa Rajbhandari, Einar Snekkenes. Case Study Role Play for Research and Training
  5. Lisa Rajbhandari, Einar Snekkenes. Using the Conflicting Incentives Risk Analysis Method

Jan Roksvold

  1. Jan Nyquist Roksvold, Hugues Verdure. The generalized weight polynomial – and how it is determined by Betti-numbers

Simona Samardjiska

  1. Simona Samardjiska. Identity Based Encryption
  2. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev. McEliece in the world of Escher
  3. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev. McEliece in the world of Escher
  4. Simona Samardjiska, Danilo Gligoroski. On a Class of Quadratic Permutation Polynomials Over F_(2^n)
  5. Simona Samardjiska, Danilo Gligoroski. Towards a Characterization of Left Quasigroup Polynomials of Small Degree Over Fields of Characteristic 2
  6. Simona Samardjiska, Danilo Gligoroski. On a Class of Quadratic Permutation and Quasigroup Polynomials Over Finite Fields of Characteristic 2
  7. Simona Samardjiska, Danilo Gligoroski. Towards a secure Multivariate Identity-Based Encryption
  8. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski. On the strong and weak keys in MQQ-SIG

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Automatic rule-mining for malware detection employing Neuro-Fuzzy Approach

Kashif Habib Sheikh

  1. Kashif Habib Sheikh. Adaptive Security for the Internet of Things Reference Model
  2. Kashif Habib Sheikh. Adaptive Security for the Internet of Things
  3. Kashif Habib Sheikh, Wolfgang Leister. Adaptive Security for the Internet of Things Reference Model

Berglind Smaradottir

  1. Rune Werner Fensli, Berglind Smaradottir, Martin Gerdes, Dafferianto Trinugroho. Tester ut e-helse på UiA
  2. Berglind Smaradottir. Usability Evaluation of Health Care Applications
  3. Berglind Smaradottir, Dafferianto Trinugroho, Martin Gerdes. Framtidens eldreomsorg i eget hjem
  4. Martin Gerdes, Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Dafferianto Trinugroho. Demonstration of telehealth and telecare applications in the UiA eHealth center, with focus on technology and usability testing of remote diagnosis solutions

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt, Christoph Busch. Volumetric Fingerprint Data Analysis using Optical Coherence Tomography

Aryan TaheriMonfared

  1. Aryan TaheriMonfared, Chunming Rong. Multi-tenant Network Monitoring Based on Software Defined Networking
  2. Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong. Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework

Mohsen Toorani

  1. Mehdi Chehel Amirani, Mohsen Toorani, Sara Mihandoost. Feature-based type identification of file fragments

Joseph Twayigira

  1. Joseph Twayigira. ,Vladimir A Oleshchuk, Attributes Based Access Control for Cloud-based Emergency and Crisis Management
  2. Joseph Twayigira. ,Vladimir A Oleshchuk, Gaurav Bajpai, Role Based Access Control for Cloud-based Emergency and Crisis Management

Nils Ulltveit-Moe

  1. Terje Gjøsæter, Nils Ulltveit-Moe. WP2 – Methodology to identify assets and associated threates and vulnerabilities – Risks and Challenges
  2. Terje Gjøsæter, Nils Ulltveit-Moe. WP2 – Methodology to identify assets and associated threats and vulnerabilities
  3. Terje Gjøsæter, Nils Ulltveit-Moe. Consortium Partner Presentation – University of Agder (UiA)
  4. Nils Ulltveit-Moe, Terje Gjøsæter. PRECYSE WP2 Methodology: Architectural issues, D2.2, Action plan
  5. Nils Ulltveit-Moe. PRECYSE Architecture from a Strategic Planning and Operational Perspective
  6. Nils Ulltveit-Moe, Vladimir Oleshchuk. Measuring privacy leakage for IDS rules
  7. Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk. Privacy handling for critical information infrastructures
  8. Nils Ulltveit-Moe. PRECYSE Architecture from a Strategic Planning and Operative Perspective
  9. Nils Ulltveit-Moe. Enforcing Privacy for Critical Infrastructures

Gaute Wangen

  1. Gaute Wangen, Einar Snekkenes. A Taxonomy of Challenges in Information Security Risk Management

Takashi Watanabe

  1. Yu-Ichi Hayashi, Naofumi Homma, Takashi Watanabe, William O. Price, William A. Radasky. Introduction to the Special Section on Electromagnetic Information Security

Goitom Weldehawaryat

  1. Goitom Weldehawaryat, Stephen Wolthusen. Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

Huihui Yang

  1. Huihui Yang. Privacy policies for online systems
  2. Huihui Yang. A General Framework for Group Authentication and Key Exchange Protocols

Kassaye Yitbarek Yigzaw

  1. Kassaye Yitbarek Yigzaw. The Snow Communicable Disease Outbreak Detection Approach
  2. Kassaye Yitbarek Yigzaw. Towards Privacy Preserving Comparative Effectiveness Research
  3. Kassaye Yitbarek Yigzaw. The Snow Infectious Disease Forecast Service
  4. Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika. Towards privacy preserving comparative effectiveness research
  5. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen. The Snow system – a distributed medical data processing system
  6. Stein Olav Skrøvseth, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Per Atle Bakkevoll, Gunnar Skov Simonsen, Tore Jarl Gutteberg, Johan Gustav Bellika. The Snow communicable disease outbreak detection approach
  7. Kassaye Yitbarek Yigzaw, Tore Jarl Gutteberg, Johan Gustav Bellika. The Snow infectious disease forecast service
  8. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas. Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  9. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas. Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data