Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg. Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. UnRizkNow: An open electronic community of practice for information security professionals
  2. Vivek Agrawal. Secure migration to the cloud
  3. Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
  4. Vivek Agrawal, Einar Arthur Snekkenes. Creating a successful Communities of practice
  5. Vivek Agrawal, Einar Arthur Snekkenes. UnRizkNow: A community of practice for information security risk practitioners
  6. Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
  7. Vivek Agrawal, Einar Arthur Snekkenes. Utfordringer og muligheter for deling av informasjon innen Cyber Security
  8. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  9. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard
  10. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  11. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  12. Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
  13. Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
  14. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard
  15. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  16. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  17. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice

Jayachander Surbiryala

  1. Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing
  2. Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
  3. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras

Hamed Arshad

  1. Hamed Arshad, R Abbas. A secure authentication and key agreement scheme for roaming service with user anonymity
  2. A Irshad, S Kumari, X Li, F Wu, S A Chaudhry, Hamed Arshad. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  3. Hamed Arshad, Morteza Nikooghadam, S Avezverdi, M Nazari. Design and FPGA implementation of an efficient security mechanism for mobile pay TV systems

Ramtin Aryan

  1. Ramtin Aryan, Anis Yazidi, Paal E. Engelstad, Øivind Kure. A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
  2. Ramtin Aryan, Anis Yazidi, Paal E. Engelstad, Øivind Kure. A General Formalism for Defining and Detecting OpenFlow Rule Anomalies

Siri Bromander

  1. Siri Bromander. Ethical Considerations in Sharing Cyber Threat Intelligence
  2. Vasileios Mavroeidis, Siri Bromander. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.

Chris Carr

  1. Colin Alexander Boyd, Christopher Carr, Xavier Boyen, Thomas Haines. Bitcoin Unchained
  2. Britta Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for maximum flexibility and user-side control
  3. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines. Key recovery: Inert and public

Benjamin Chetioui

  1. Benjamin Chetioui. Pizzagate Writeup (34C3 CTF)
  2. Benjamin Chetioui. Ssi Writeup (WhiteHat Grand Prix CTF 2017)
  3. Benjamin Chetioui. SqlSRF Writeup (SECCON CTF 2017)

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns

Flávia Dias Casagrande

  1. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia
  2. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Commercialization of Personal Data and its Implications for the Foundations and Policy Boundaries of Data Privacy Law and Competition Law
  2. Samson Yoseph Esayas. Competition Law: Its Impact on Data Sharing and the Data Economy
  3. Samson Yoseph Esayas. Competition in Dissimilarity: Lessons in Privacy from the Facebook/WhatsApp Merger
  4. Samson Yoseph Esayas. Privacy-as-a-Quality Parameter of Competition: Some Reflections on the Scepticism
  5. Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law
  6. Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach

Seraj Fayyad

  1. Seraj Fayyad, Josef Noll. Toward Objective Security Measurability and Manageability
  2. Seraj Fayyad, Josef Noll. A Framework for Measurability of Security
  3. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial

Herman Galteland

  1. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
  2. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack

Harsha Sandaruwan Gardiyawasam Pussewalage

  1. Sasanka Niromi Ranasinghe, Harsha Gardiyawasam Pussewalage, Peter Hugh Middleton. Performance analysis of single cell solid oxide fuel cells
  2. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Attribute based access control scheme with controlled access delegation for collaborative E-health environments
  3. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
  4. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment

Navid Ghaedi Bardeh

  1. Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth. Yoyo tricks with AES

Vasileios Gkioulos

  1. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives
  2. Vasileios Gkioulos, Erko Risthein, Stephen Wolthusen. TACTICS: Validation of the security framework developed for tactical SOA
  3. Vasileios Gkioulos, Stephen Wolthusen. Security Requirements for the Deployment of Services Across Tactical SOA
  4. Vasileios Gkioulos, Stephen Wolthusen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  5. Vasileios Gkioulos, Stephen Wolthusen. A Security Policy Infrastructure for Tactical Service Oriented Architectures
  6. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  7. Vasileios Gkioulos, Stephen Wolthusen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

Britta Hale

  1. Colin Alexander Boyd, Britta Hale. Secure Channels and Termination: The Last Word on TLS
  2. Britta Hale. Expanding ACCE: Robust Secure Channel Establishment
  3. Britta Hale. Low-Latency Key Exchange and Secure Channels
  4. Charlotte S. Rikardsen, Britta Hale, Stig Frode Mjølsnes. User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps
  5. Britta Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for maximum flexibility and user-side control
  6. Britta Hale, Tibor Jager, Sebastian Lauer, Jorg Schwenk. Simple security definitions for and constructions of 0-RTT key exchange
  7. Britta Hale. Sikkerhet i en digital verden med hackere hakk i hæl
  8. Britta Hale. Secure Channels
  9. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  10. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  11. Britta J. Hale. Signal: What, Why, How
  12. Britta J. Hale. Deep Web and Dark Web

Cristina Heghedus

  1. Cristina Viorica Heghedus. Ph.D. Forum: Forecasting Public Transit Using Neural Network Models

Håkon Jacobsen

  1. Håkon Jacobsen. A Modular Security Analysis of EAP and IEEE 802.11
  2. Chris Brzuska, Håkon Jacobsen. A modular security analysis of EAP and IEEE 802.11

Jan William Johnsen

  1. Andrii Shalaginov, Jan William Johnsen, Katrin Franke. Cyber Crime Investigations in the Era of Big Data
  2. Andrii Shalaginov, Katrin Franke, Jan William Johnsen. IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
  3. Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks

Farzane Karami

  1. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures
  2. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures

Dat Le Tien

  1. Shweta Shinde, Dat Tien Le, Shurti Topple, Prateek Saxena. PANOPLY: Low-TCB Linux Applications with SGX Enclaves

Yan Li

  1. Shaukat Ali, Yan Li, Tao Yue, Man Zhang. An Empirical Evaluation of Mutation and Crossover Operators for Multi-Objective Uncertainty-Wise Test Minimization

Vasileios Mavroeidis

  1. Kamer Vishi, Vasileios Mavroeidis. An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics
  2. Pierre Lison, Vasileios Mavroeidis. Neural Reputation Models learned from Passive DNS data
  3. Pierre Lison, Vasileios Mavroeidis. Automatic Detection of Malware-Generated Domains with Recurrent Neural Models
  4. Vasileios Mavroeidis, Siri Bromander. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.
  5. Vasileios Mavroeidis, Nicho Mathew. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks

Per Håkon Meland

  1. Per Håkon Meland. H2020: Digital Security
  2. Per Håkon Meland. What’s hot or not in cyber security research and innovation
  3. Per Håkon Meland. Cyber Security in Merchant Shipping (CySiMS)
  4. Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe, Fredrik Seehusen. Facing uncertainty in cyber insurance policies
  5. Christian Frøystad, Karin Bernsmed, Per Håkon Meland. Protecting Future Maritime Communication
  6. Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Tor Andre Myrvoll. Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management

Maghsoud Morshedi Chinibolagh

  1. Maghsoud Morshedi, Hårek Haugerud, Kyrre Begnum. Making the Case for Highly Efficient Multicore Enabled Unikernels With IncludeOS

Christian Otterstad

  1. Christian W. Otterstad. On the effectiveness of non-readable executable memory against BROP
  2. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole. Selected x86 Low-level Attacks and Mitigations
  3. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. Digital forensic implications of collusion attacks on the lightning network

Kyle Porter

  1. Kyle Porter, Slobodan Petrovic. On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
  2. Kyle Porter, Slobodan Petrovic. On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics

Ashish Rauniyar

  1. Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang, Soo Young Shin. Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things

Patrick Schuch

  1. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Deep Expectation for Estimation of Fingerprint Orientation Fields
  2. Patrick Schuch, Simon Schulz, Christoph Busch. Minutia-based Enhancement of Fingerprint Samples
  3. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Intrinsic Limitations of Fingerprint Orientation Estimation
  4. Patrick Schuch, Simon Schulz, Christoph Busch. Minutia-based Enhancement of Fingerprint Samples
  5. Patrick Schuch, Simon Schulz, Christoph Busch. Deep Expectation for Estimation of Fingerprint Orientation Fields
  6. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Intrinsic Limitations of Fingerprint Orientation Estimation
  7. Patrick Schuch, Simon Schulz, Christoph Busch. Survey on the impact of fingerprint image enhancement
  8. Patrick Schuch, Simon Schulz, Christoph Busch. De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
  9. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. ConvNet Regression for Fingerprint Orientations

Felix Schuckert

  1. Felix Schuckert, Basel Katt, Hanno Langweg. Source Code Patterns of SQL Injection Vulnerabilities

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. A Deep Neuro-Fuzzy method for multi-label malware classification and fuzzy rules extraction
  2. Andrii Shalaginov. Computational Forensics
  3. Andrii Shalaginov, Jan William Johnsen, Katrin Franke. Cyber Crime Investigations in the Era of Big Data
  4. Andrii Shalaginov, Katrin Franke, Jan William Johnsen. IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
  5. Andrii Shalaginov. Fuzzy logic model for digital forensics: A trade-off between accuracy, complexity and interpretability
  6. Andrii Shalaginov. Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
  7. Andrii Shalaginov. Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection
  8. Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU
  9. Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness

Manish Shrestha

  1. Manish Shrestha, Christian Johansen, Josef Noll. Security Classification for Smart Grid Infra structures (long version)

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
  2. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography

Martin Stokkenes

  1. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch. Feature Level Fused Templates for Multi-Biometric System on Smartphones
  2. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters

Martin Strand

  1. Kristian Gjøsteen, Martin Strand. A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
  2. Martin Strand. Sikkert som banken

Bo Sun

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions

Jayachander Surbiryala

  1. Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing
  2. Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
  3. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras

Adam Szekeres

  1. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  2. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study

Andrea Tenti

  1. Bjørn Ian Dundas, Andrea Tenti. Higher Hochschild homology is not a stable invariant

Shukun Tokas

  1. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things
  2. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things

Kamer Vishi

  1. Kamer Vishi, Vasileios Mavroeidis. An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics

Gaute Wangen

  1. Gaute Wangen, Niclas Hellesen, Erlend Brækken, Henrik Torres. An Empirical Study of Root-Cause Analysis in Information Security Management
  2. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives
  3. Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
  4. Gaute Wangen. Information Security Risk Assessment: A Method Comparison
  5. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives

Pankaj Wasnik

  1. Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch. Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
  2. Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja. Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
  3. Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
  4. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
  5. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System

Goitom Weldehawaryat

  1. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised scheduling of power consumption in micro-grids: Optimisation and security

Shao-Fang Wen

  1. Shao-Fang Wen. Software Security in Open Source Development: A Systematic Literature Review
  2. Shao-Fang Wen, Stewart James Kowalski. A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities

Tetiana Yarygina

  1. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices
  2. Tetiana Yarygina. RESTful Is Not Secure