Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Martin Gerdes, Geir Myrdahl Køien. A STRIDE-Based Threat Model for Telehealth Systems
  2. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks

Bikash Agrawal

  1. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski. AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
  2. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski. Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
  3. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming. Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
  4. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: A framework to analyse open TSDB Time-series data in HBase

Vivek Agrawal

  1. Thomas Kemmerich, Vivek Agrawal, Carsten Momsen. Secure migration to the cloud—In and out
  2. Vivek Agrawal. Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Waqas Aman

  1. Waqas Aman, Einar Snekkenes. Managing Security Trade-offs in the Internet of Things using Adaptive Security
  2. Waqas Aman, Einar Snekkenes. EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things

Maria Bartnes

  1. Ingrid Graffer, Maria Bartnes, Karin Bernsmed. Play2Prepare: A Board Game Supporting IT Security Preparedness Exercises for Industrial Control Organizations
  2. Maria Bartnes, Inger Anne Tøndel, Martin Gilje Jaatun. Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations
  3. Maria Bartnes Line. Understanding information security incident management practices: A case study in the electric power industry
  4. Haakon Barstad, Maria Bartnes Line. IT-sikkerheten ikke prioritert
  5. Maria Bartnes Line, Nils Brede Moe. Cross-functional Teams Needed for Managing Information Security Incidents in Complex Systems
  6. Maria Bartnes Line. IT security preparedness exercises in the electric power industry
  7. Maria Bartnes Line, Nils Brede Moe. Understanding Collaborative Challenges in IT Security Preparedness Exercises
  8. Erlend Andreas Gjære, Martin Gilje Jaatun, Per Håkon Meland, Inger Anne Tøndel, Karin Bernsmed, Marie Elisabeth Gaup Moe, Maria Bartnes Line. Blogg fra SINTEF forskningsgruppe informasjonssikkerhet
  9. Maria Bartnes Line, Nils Brede Moe. Norske nettselskaper øver ikke på IT-angrep
  10. Maria Bartnes Line, Nils Brede Moe. Nettselskaper øver ikke på IT-angrep
  11. Maria Bartnes Line, Nils Brede Moe. Sjefen må være med på beredskapsøvelser
  12. Maria Bartnes Line, Nils Brede Moe. El-nettselskaper øver ikke på IT-angrep
  13. Atle Abelsen, Maria Bartnes Line, Nils Brede Moe. Få øver beredskap
  14. Inger Anne Tøndel, Maria Bartnes Line, Gorm Idar Johansen. Assessing Information Security Risks of AMI: What Makes it so Difficult?
  15. Maria Bartnes Line, Nils Brede Moe. Hvorfor øves det så lite på IT-kriser?

Chris Carr

  1. Britta Hale, Christopher Alan Carr, Danilo Gligoroski. CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control

Antorweep Chakravorty

  1. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: A framework to analyse open TSDB Time-series data in HBase

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Approximate search with constraints on indels with application in SPAM filtering

Samson Yoseph Esayas

  1. Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjørnstad, Veda Brubakk. An integrated method for compliance and risk assessment
  2. Samson Yoseph Esayas. The Role of Anonymisation and Pseudonymisation under the EU Data Privacy Rules: Beyond the ‘All or Nothing’ Approach
  3. Samson Yoseph Esayas. An Integrated Method for Compliance and Risk Assessment: Experiences from a Case Study
  4. Samson Yoseph Esayas, Tobias Mahler. Modelling compliance risk: a structured approach
  5. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler. Using Technology to Enhance Confidentiality and Regulatory Compliance by Design
  6. Samson Yoseph Esayas, Tobias Mahler, Bjørnar Solhaug. An Integrated Approach for Compliance and Security Risk Assessment
  7. Samson Yoseph Esayas. Breach Notification Requirements under the European Union Legal Framework: Convergence, Conflicts and Complexity in Compliance
  8. Samson Yoseph Esayas. The Role of Anonymisation and Pseudonymisation under the EU Data Privacy Rules

Stian Fauskanger

  1. Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Stian Fauskanger. Policy-Based Labelling: A Flexible Framework for Trusted Data Labelling
  2. Stian Fauskanger, Igor A. Semaev. Statistical and Algebraic Properties of DES

Seraj Fayyad

  1. Seraj Fayyad, Josef Noll. Components Interconnection Consideration In Multi Metrics Approach
  2. Seraj Fayyad, Josef Noll. Components Interconnection Consideration In Multi Metrics Approach
  3. Iñaki Garitano, Seraj Fayyad, Josef Noll. Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
  4. Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie. Measurable Security, Privacy and Dependability in Smart Grids

Samson Gejibo

  1. Samson Hussien Gejibo, Khalid Azim Mughal. Towards a Secure Framework for mHealth. A Case Study in Mobile Data Collection Systems

Vasileios Gkioulos

  1. Vasileios Gkioulos, Stephen Wolthusen. Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks

Britta Hale

  1. Britta Hale. Implications between Authentication Levels and Secure Termination
  2. Britta Hale, Christopher Alan Carr, Danilo Gligoroski. CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control

Kjetil Kjernsmo

  1. Kjetil Kjernsmo. LWP::UserAgent::CHICaching
  2. Kjetil Kjernsmo. RDF::NS::Curated
  3. Kjetil Kjernsmo. Attean SPARQL Store
  4. Kjetil Kjernsmo, Ruben Verborgh. How can scientific methods provide guidance for Semantic Web Research and Development?
  5. Kjetil Kjernsmo. Experimental prefetching SPARQL query cacher
  6. Kjetil Kjernsmo. How can scientific methods provide guidance for Semantic Web Research and Development?
  7. Kjetil Kjernsmo. A Survey of HTTP Caching Implementations on the Open Semantic Web
  8. Kjetil Kjernsmo. A Survey of HTTP Caching Implementations on the Open Semantic Web
  9. Kjetil Kjernsmo. Addendum to a survey of HTTP caching on the Semantic Web

Guoqiang Li

  1. Guoqiang Li, Bian Yang, Christoph Busch. A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
  2. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch. Towards generating protected fingerprint templates based on bloom filters
  3. Guoqiang Li, Bian Yang, Christoph Busch. A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation

Yan Li

  1. Katsiaryna Labunets, Yan Li, Fabio Massacci, Federica Paci, Martina Ragosta, Bjørnar Solhaug, Ketil Stølen, Alessandra Tedeschi. Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models

Yi-Ching Liao

  1. Yi-Ching Liao, Hanno Langweg. Events and causal factors charting of kernel traces for root cause analysis
  2. Yi-Ching Liao. A Survey of Software-Based String Matching Algorithms for Forensic Analysis
  3. Yi-Ching Liao, Hanno Langweg. Developing Metrics for Surveillance Impact Assessment

Edlira Martiri

  1. Edlira Nepravishta Martiri. Privacy Preserving Biometrics and Duplicate Enrolment Check
  2. Bian Yang, Edlira Nepravishta Martiri. Using Honey Templates to Augment Hash Based Biometric Template Protection
  3. Edlira Nepravishta Martiri, Bian Yang, Christoph Busch. Protected Honey Face Templates

Soumik Mondal

  1. Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours. Keystroke Dynamics Performance Enhancement With Soft Biometrics
  2. Soumik Mondal, Patrick Bours. Context independent continuous authentication using behavioural biometrics
  3. John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia. One-handed Keystroke Biometric Identification Competition
  4. Soumik Mondal, Patrick Bours. Continuous authentication and identification for mobile devices: Combining security and forensics
  5. Soumik Mondal, Patrick Bours. Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device
  6. Patrick Bours, Soumik Mondal. Performance evaluation of continuous authentication systems
  7. Patrick Bours, Soumik Mondal. Continuous Authentication with Keystroke Dynamics
  8. Soumik Mondal, Patrick Bours. Swipe Gesture based Continuous Authentication for Mobile Devices
  9. Soumik Mondal, Patrick Bours. Continuous Authentication in a Real World Settings
  10. Soumik Mondal, Patrick Bours. A Computational Approach to the Continuous Authentication Biometric System

Martin Aastrup Olsen

  1. Martin Aastrup Olsen, Marek Dusio, Christoph Busch. Fingerprint skin moisture impact on biometric performance
  2. Carsten Gottschlich, Anna Mikaelyan, Martin Aastrup Olsen, Josef Bigun, Christoph Busch. Improving Fingerprint Alteration Detection
  3. Martin Aastrup Olsen, Martin Böckeler, Christoph Busch. Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments

Pankaj Pandey

  1. Pankaj Pandey, Einar Snekkenes. A Performance Assessment Metric for Information Security Financial Instruments
  2. Pankaj Pandey. “CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS WITH OVERALL ORGANIZATIONAL STRATEGY
  3. Pankaj Pandey, Steven DeHaes. A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk
  4. Pankaj Pandey, Steven De Haes. Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks
  5. Pankaj Pandey, Steven De Haes. A Novel Financial Instrument to Incentivize Investments in Information Security Controls and Mitigate Residual Risk
  6. Pankaj Pandey, Einar Snekkenes. Design and Performance Aspects of Information Security Prediction Markets for Risk Management

Jan Roksvold

  1. Vibeke Os, Jan Nyquist Roksvold. Ren matematikk
  2. Jan Nyquist Roksvold. Some combinatorial invariants determined by Betti numbers of Stanley-Reisner ideals
  3. Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure. Betti numbers associated to the facet ideal of a matroid

Simona Samardjiska

  1. Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae. A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
  2. Simona Samardjiska, Danilo Gligoroski. Approaching maximum embedding efficiency on small covers using Staircase-Generator codes
  3. Simona Samardjiska. Multivariate Public Key Cryptosystems Produced by Quasigroups

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy
  2. Andrii Shalaginov. Application of Computational Intelligence for Digital Forensics
  3. Andrii Shalaginov. Automated generation of the human-understandable rules from network traffic dumps
  4. Andrii Shalaginov, Katrin Franke. Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations
  5. Andrii Shalaginov, Katrin Franke. Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications
  6. Andrii Shalaginov, Katrin Franke. A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
  7. Andrii Shalaginov, Katrin Franke. A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications

Kashif Habib Sheikh

  1. Kashif Habib, Wolfgang Leister. Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures
  2. Kashif Habib, Wolfgang Leister. Context-Aware Authentication for the Internet of Things
  3. Kashif Habib, Arild Braathen Torjusen, Wolfgang Leister. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth

Berglind Smaradottir

  1. Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: user-centred design and evaluation of a collaborative information system for a Norwegian telehealth service
  2. Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: User-Centred Design and Evaluation of a Collaborative Information System for a Norwegian Telehealth Service
  3. Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Rune Werner Fensli. eHealth-extended Care Coordination: Development of a Collaborative System for Inter-municipal Dementia Teams- A research project with a user-centered design approac
  4. Berglind Smaradottir, Jarle Audun Håland, Santiago Martinez, Åsmund Rodvig Somdal, Rune Werner Fensli. Recommendations of a Test Infrastructure for Evaluation of Touchscreen Assistive Technology for Visually Impaired Users
  5. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User Interface Development of a COPD Remote Monitoring Application- A User-centred Design Process
  6. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of a COPD Remote Monitoring Application
  7. Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Rune Werner Fensli. eHealth-extended Care Coordination: Development of a Collaborative System for Inter-municipal Dementia Teams- A research project with a user-centered design approach
  8. Berglind Smaradottir. Brukermedvirkning i utviklingen av en telemedisinsk applikasjon for KOLS-pasienter
  9. Berglind Smaradottir. Brukermedvirkning ved utvikling og evaluering av systemer, Erfaringer fra United4Health prosjektet
  10. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User-Centered Design of a COPD Remote Monitoring Application Experiences from the EU-project United4Health
  11. Berglind Smaradottir. Brukermedvirkning ved utvikling og evaluering av systemer. Erfaringer fra prosjektet United4Health ved Senter for eHelse
  12. Berglind Smaradottir. Presentasjon av forskning ved Senter for eHelse og velferdsteknologi. Erfaringer fra prosjektet United4Health.
  13. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability evaluation of a COPD remote monitoring application
  14. Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
  15. Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: User-Centred Design and Evaluation of a Collaborative Information System for a Norwegian Telehealth Service
  16. Berglind Smaradottir, Jarle Audun Håland, Santiago Martinez, Åsmund Rodvig Somdal, Rune Werner Fensli. Recommendations on a Test Infrastructure for Evaluation of Touchscreen Assistive Technology for Visually Impaired Users
  17. Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. User-Centred Design of an Information System for a Norwegian Telehealth Service
  18. Berglind Smaradottir, Santiago Martinez. Brukermedvirkning i utforming og evaluering av velferdsteknologi. Erfaringer fra United4Health-prosjektet
  19. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of a COPD Remote Monitoring Application
  20. Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
  21. Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User Interface Development of a COPD Remote Monitoring Application A User-centred Design Process
  22. Berglind Smaradottir. Presentasjon av forskning ved Senter for eHelse- Erfaringer fra prosjektet United4Health.
  23. Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. User-Centred Design of the User Interface of a Collaborative Information System for Inter-Municipal Dementia Team
  24. Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
  25. Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. User-Centred Design of the User Interface of a Collaborative Information System for Inter-Municipal Dementia Team

Ctirad Sousedik

  1. Ralph Breithaupt, Ctirad Sousedik, Sven Meissner. Full fingerprint scanner using optical coherence tomography

Martin Stokkenes

  1. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch. Fusion of Face and Periocular Information for Improved Authentication on Smartphones
  2. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch. Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular

Aryan TaheriMonfared

  1. Aryan TaheriMonfared, Chunming Rong. Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants

Mohsen Toorani

  1. Mohsen Toorani, Øyvind Ytrehus. Security protocols and related topics
  2. Mohsen Toorani. Interactive Information Theory
  3. Mohsen Toorani. Security Protocols and Provable Security
  4. Mohsen Toorani. On vulnerabilities of the security association in the IEEE 802.15.6 standard
  5. Mohsen Toorani. Cryptanalysis of a Protocol from FC’10
  6. Mohsen Toorani. Cryptanalysis of two PAKE protocols for body area networks and smart environments
  7. Mohsen Toorani. On Continuous After-the-Fact Leakage-Resilient Key Exchange
  8. Mohsen Toorani. On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
  9. Mohsen Toorani. Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy

Dijana Vukovic

  1. Aleksandar Kelec, Dijana Vukovic. Privacy threats on Android devices – Big Brother is watching you
  2. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. CryptoCloak Protocol and the Prototype Application

Gaute Wangen

  1. Gaute Wangen. An Initial Insight Into InfoSec Risk Management Practices
  2. Gaute Wangen. Conflicting Incentives Risk Analysis: A Case Study of the Normative Peer Review Process
  3. Gaute Wangen. The role of malware in reported cyber espionage: A review of the impact and mechanism

Goitom Weldehawaryat

  1. Goitom Weldehawaryat, Stephen Wolthusen. Secure distributed demand projection in micro-grids
  2. Goitom Weldehawaryat, Stephen Wolthusen. Modelling Interdependencies over Incomplete Join Structures of Power Law Networks

Huihui Yang

  1. Huihui Yang, Vladimir Oleshchuk. Traceable hierarchical attribute-based authentication for the cloud
  2. Huihui Yang, Vladimir Oleshchuk. ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
  3. Huihui Yang, Vladimir Oleshchuk. An efficient traceable attribute-based authentication scheme with one-time attribute trees
  4. Huihui Yang, Vladimir Oleshchuk. A dynamic attribute-based authentication scheme

Kassaye Yitbarek Yigzaw

  1. Luis Marco Ruiz, Pablo Pazos, Koray Atalag, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Enabling Clinical Data Reuse with openEHR Data Warehouse Environments
  2. Meskerem Asfaw Hailemichael, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Emnet: a tool for privacy-preserving statistical computing on distributed health data