Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Jayachander Surbiryala

  1. Yuri Demchenko, Zhiming Zhao, Jayachander Surbiryala, Spiros Koulouzis, Zeshun Shi, Xiaofeng Liao, Jelena Gordiyenko. Teaching DevOps and Cloud Based Software Engineering in University Curricula
  2. Jayachander Surbiryala, Rong Chunming. Cloud Computing: History and Overview
  3. Zeshun Shi, Huan Zhou, Jayachander Surbiryala, Yang Hu, Cees de Laat, Zhiming Zhao. An Automated Customization and Performance Profiling Framework for Permissioned Blockchains in a Virtualized Environment
  4. Zeshun Shi, Huan Zhou, Yang Hu, Jayachander Surbiryala, Cees de Laat, Zhiming Zhao. Operating Permissioned Blockchain in Clouds: A Performance Study of Hyperledger Sawtooth
  5. Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala. Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers

Ramtin Aryan

  1. Ramtin Aryan, Frode Henriksen Brattensborg, Anis Yazidi, Paal Engelstad. Checking the OpenFlow Rule Installation and Operational Verification
  2. Ramtin Aryan, Frode Brattensborg, Anis Yazidi, Paal E. Engelstad. Checking the OpenFlow Rule Installation and Operational Verification

Sergii Banin

  1. Sergii Banin, Geir Olav Dyrkolbotn. Correlating High- and Low-Level Features: Increased Understanding of Malware Classification

Benjamin Chetioui

  1. Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià. Finite difference methods fengshui: alignment through a mathematics of arrays
  2. Benjamin Chetioui. RCE through URI protocol handlers on mIRC <7.55 (CVE-2019-6453)
  3. Benjamin Chetioui. CVE-2019-6453: RCE on mIRC <7.55 using argument injection through custom URI protocol handlers
  4. Benjamin Chetioui. Bitshift Writeup (Sogeti Cyber E-Scape 2019 Qualifier)
  5. Benjamin Chetioui. Drinks Writeup (Insomnihack Teaser 2019)

Ambika Chitrakar

  1. Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke. Identifying Anomalous HTTP Traffic with Association Rule Mining
  2. Ambika Shrestha Chitrakar, Slobodan Petrovic. Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics

Peter Davis

  1. Peter Alexander Earls Davis. Assistance and Access Act (Australia): the Latest Government Attempt to Resist “Going Dark”
  2. Peter Alexander Earls Davis, Luca Tosoni. EU cybersecurity act, NIS directive, experience with GDPR after one year

Flávia Dias Casagrande

  1. Flavia Dias Casagrande, Evi Zouganeli. Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes
  2. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  3. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  4. Flavia Dias Casagrande. Sensor Event and Activity Prediction using Binary Sensors in Real Homes with Older Adults
  5. Flavia Dias Casagrande, Evi Zouganeli. Activity Recognition and Prediction in Real Homes
  6. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults
  7. Evi Zouganeli, Flavia Dias Casagrande. Hvordan kan kunstig intelligens støtte eldre til å leve et selvstendig liv hjemme og hva har Assisted Living prosjektet bidratt med.
  8. Flavia Dias Casagrande, Oda Olsen Nedrejord, Wonho Lee, Evi Zouganeli. Action Recognition in Real Homes using Low Resolution Depth Video Data
  9. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
  10. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Privacy-As-A-Quality Parameter of Competition
  2. Samson Yoseph Esayas. Data Privacy in European Merger Control: Critical Analysis of Commission Decisions Regarding Privacy as a Non-Price Competition

Ali Esmaeily

  1. Mohsen Bagheri, Maryam Dehghani, Ali Esmaeily, Vahid Akbari. Assessment of land subsidence using interferometric synthetic aperture radar time series analysis and artificial neural network in a geospatial information system: Case study of Rafsanjan Plain

Harsha Sandaruwan Gardiyawasam Pussewalage

  1. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
  2. Harsha Gardiyawasam Pussewalage. Attribute Based Cryptographic Enforcements for Security and Privacy in E-health Environments

Befekadu Gebraselase

  1. Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang. Suitability of Blockchains to Enable and Support Networking Functions: State of Art

Navid Ghaedi Bardeh

  1. Navid Ghaedi Bardeh, Sondre Rønjom. The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts
  2. Navid Ghaedi Bardeh, Sondre Rønjom. Practical attacks on reduced-round AES

Håkon Gunleifsen

  1. Håkon Gunleifsen. Security in Interconnected Network Function Virtualisation Environments
  2. Håkon Gunleifsen, Vasileios Gkioulos, Gaute Wangen, Andrii Shalaginov, Mazaher Kianpour, Mohamed Ali Saleh Abomhara. Cybersecurity Awareness and Culture in Rural Norway
  3. Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos. A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
  4. Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos. Dynamic setup of IPsec VPNs in service function chaining
  5. Håkon Gunleifsen. Cyber security awareness and culture in rural Norway

Cristina Heghedus

  1. Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong. Neural Network Frameworks. Comparison on Public Transportation Prediction
  2. Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong. Neural Network Architectures for Electricity Consumption Forecasting
  3. Cristina Viorica Heghedus, Anton Shchipanov, Rong Chunming. Advancing Deep Learning to Improve Upstream Petroleum Monitoring
  4. Cristina Viorica Heghedus, Anton Shchipanov, Chunming Rong. Pattern Recognition and Flow Rate Reconstruction: PDG Data Analysis Using Machine Learning

Debesh Jha

  1. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen. ResUNet++: An Advanced Architecture for Medical Image Segmentation
  2. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen. ResUNet++: An Advanced Architecture for Medical Image Segmentation

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. The impact of preprocessing in natural language for open source intelligence and criminal investigation

Nikolay Kaleyski

  1. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stănică. Partially APN Boolean functions and classes of functions that are not APN infinitely often
  2. Nikolay Stoyanov Kaleyski. Changing APN functions at two points

Farzane Karami

  1. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani. Summary of: An Evaluation of Interaction Paradigms for Active Objects

Ali Khodabakhsh

  1. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
  2. Ali Khodabakhsh, Marius Pedersen, Christoph Busch. Subjective Versus Objective Face Image Quality Evaluation For Face Recognition

Benjamin Knox

  1. Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin. Cyber Defense Officer Profiles and Performance factors
  2. Stefan Sütterlin, Benjamin James Knox, Ricardo Gregorio Lugo. TalTechi küberkaitseteadlased: ainult tehnilistest oskustest ja teadmistest küberkaitses ei piisa
  3. Benjamin James Knox, Ricardo Gregorio Lugo, Stefan Sütterlin. Cognisance as a human factor in military cyber defence education
  4. Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala. Self-regulation and cognitive agility in cyber operations
  5. Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin. Cognitive Profiles and Education of Female Cyber Defence Operators
  6. Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin. Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower

Vasileios Mavroeidis

  1. Alexander Egiazarov, Vasileios Mavroeidis, Kamer Vishi, Fabio Massimo Zennaro. Firearm Detection and Segmentation using an Ensemble of Semantic Neural Networks

Per Håkon Meland

  1. Bent Johansen, Guttorm Sindre, Per Håkon Meland. You Don’t Know CryptoJack
  2. Per Håkon Meland, Bent Johansen. You Don’t Know CryptoJack
  3. Thor Myklebust, Per Håkon Meland, Tor Stålhane, Geir Kjetil Hanssen. The Agile RAMSS lifecycle for the future
  4. Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre. An experimental analysis of cryptojacking attacks
  5. Per Håkon Meland. Resilient Cyber Security Through Cybercrime Market Analysis
  6. Ulrik Franke, Per Håkon Meland. Demand side expectations of cyber insurance
  7. Matthieu Branlat, Per Håkon Meland, Tor Erik Evjemo, Anthony Smoker. Connectivity and resilience of remote operations: insights from Air Traffic Management
  8. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. An experimental evaluation of bow-tie analysis for security
  9. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. An experimental evaluation of bow-tie analysis for cybersecurity requirements
  10. Ørnulf Jan Rødseth, Per Håkon Meland, Christian Frøystad, Ovidiu Valentin Drugan. PKI vs. Blockchain when Securing Maritime Operations

Kalpanie Mendis

  1. Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska. 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
  2. Handunneththi V. Kalpanie Mendis, Indika A.M. Balapuwaduge, Frank Yong Li. Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain

Maghsoud Morshedi Chinibolagh

  1. Maghsoud Morshedi, Josef Noll. Deploying Energy Efficient Wi-Fi Networks

Romina Muka

  1. Romina Muka. Flere “øyne” på nettet
  2. Romina Muka, Fredrik Bakkevig Haugli, Hanne Vefsnmo, Poul Einar Heegaard. Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks

Livinus Obiora Nweke

  1. Livinus Obiora Nweke, Stephen Wolthusen, Luigi V. Mancini. A Framework for the Validation of Network Artifacts

Ashish Rauniyar

  1. Ramesh Pokhrel, Ashish Rauniyar, Anis Yazidi. In the Quest of Trade-off between Job Parallelism and Throughput in Hadoop: A Stochastic Learning Approach for Parameter Tuning on the Fly
  2. Ashish Rauniyar, Jeevan Kunwar, Hårek Haugerud, Anis Yazidi, Paal E. Engelstad. Energy Efficient Target Coverage in Wireless Sensor Networks Using Adaptive Learning
  3. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Performance Analysis of RF Energy Harvesting and Information Transmission based on NOMA with Interfering Signal for IoT Relay Systems

Parisa Rezaee Borj

  1. Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours. Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
  2. Parisa Rezaee Borj, Patrick Bours. Predatory Conversation Detection
  3. Parisa Rezaee Borj, Patrick Bours. Detecting Liars in Chats using Keystroke Dynamics
  4. Parisa Rezaee Borj, Kiran Bylappa Raja, Patrick Bours. On Preprocessing the Data for Improving Sexual Predator Detection
  5. Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours. Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
  6. Parisa Rezaee Borj, Patrick Bours. Detecting Liars in Chats using Keystroke Dynamics

Albin Severinson

  1. Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes. Block-Diagonal and LT Codes for Distributed Computing with Straggling Servers

Manish Shrestha

  1. Manish Shrestha, Christian Johansen, Josef Noll. Criteria for Security Classification of Smart Home Energy Management Systems (long version)

Åvald Åslaugson Sommervoll

  1. Dag Einar Sommervoll, Åvald Åslaugson Sommervoll. Learning from Man and Machine: Spatial Fixed Effects in Urban Econometrics
  2. Dag Einar Sommervoll, Åvald Åslaugson Sommervoll. Learning from Man or machine: Spatial fixed effects in urban econometrics
  3. Åvald Åslaugson Sommervoll, Dag Einar Sommervoll. Learning from man or machine: Spatial fixed effects in urban econometrics

Jayachander Surbiryala

  1. Yuri Demchenko, Zhiming Zhao, Jayachander Surbiryala, Spiros Koulouzis, Zeshun Shi, Xiaofeng Liao, Jelena Gordiyenko. Teaching DevOps and Cloud Based Software Engineering in University Curricula
  2. Jayachander Surbiryala, Rong Chunming. Cloud Computing: History and Overview
  3. Zeshun Shi, Huan Zhou, Jayachander Surbiryala, Yang Hu, Cees de Laat, Zhiming Zhao. An Automated Customization and Performance Profiling Framework for Permissioned Blockchains in a Virtualized Environment
  4. Zeshun Shi, Huan Zhou, Yang Hu, Jayachander Surbiryala, Cees de Laat, Zhiming Zhao. Operating Permissioned Blockchain in Clouds: A Performance Study of Hyperledger Sawtooth
  5. Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala. Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers

Adam Szekeres

  1. Adam Szekeres, Einar Arthur Snekkenes. A Taxonomy of Situations within the Context of Risk Analysis
  2. Adam Szekeres, Einar Arthur Snekkenes. Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
  3. Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation

Andrea Tenti

  1. Alessandro Budroni, Andrea Tenti. The mersenne low hamming combination search problem can be reduced to an ILP problem

Shukun Tokas

  1. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-Based Mechanisms for Privacy by Design
  2. Shukun Tokas, Olaf Owe. A Formal Framework for Consent Management

Srimathi Varadharajan

  1. Mithilesh Kumar, Håvard Raddum, Srimathi Varadharajan. Reducing lattice enumeration search trees

Irene Villa

  1. Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa. On Isotopic Shift Construction for Planar Functions
  2. Lilya Budaghyan, Marco Calderini, Irene Villa. On relations between CCZ- and EA-equivalences

Kamer Vishi

  1. Alexander Egiazarov, Vasileios Mavroeidis, Kamer Vishi, Fabio Massimo Zennaro. Firearm Detection and Segmentation using an Ensemble of Semantic Neural Networks

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch. An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
  2. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch. Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
  3. Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation

Shao-Fang Wen

  1. Shao-Fang Wen, Mazaher Kianpour, Stewart James Kowalski. An Empirical Study of Security Culture in Open Source Software Communities
  2. Shao-Fang Wen, Basel Katt. Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
  3. Shao-Fang Wen, Basel Katt. Managing Software Security Knowledge in Context: An Ontology Based Approach
  4. Shao-Fang Wen, Basel Katt. Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
  5. Shao-Fang Wen, Basel Katt. Towards a Context-Based Approach for Software Security Learning
  6. Shao-Fang Wen, Basel Katt. Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach
  7. Shao-Fang Wen, Mazaher Kianpour, Basel Katt. Security Knowledge Management in Open Source Software Communities

Shuang Wu

  1. Shuang Wu, Øyvind Mikkelsen, Shazia Nusrat Aslam. Soil-water influences on trace elements and organic matter in Arctic

Muhammad Mudassar Yamin

  1. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
  2. Muhammad Mudassar Yamin, Basel Katt. Cyber Security Skill Set Analysis for Common Curricula Development
  3. Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour. Cyber Weapons Storage Mechanisms
  4. Grethe Østby, Muhammad Mudassar Yamin, Bilal AlSabbagh. SIEMS in crisis management: Detection, escalation and presentation – a work in progress
  5. Muhammad Mudassar Yamin, Basel Katt. Modeling Attack and Defense Scenarios for Cyber Security Exercises
  6. Muhammad Mudassar Yamin, Basel Katt. Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
  7. Muhammad Mudassar Yamin, Basel Katt, Kashif Sattar, Maaz Bin Ahmad. Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
  8. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos. Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
  9. Muhammad Mudassar Yamin, Basel Katt. A Survey of Automated Information Exchange Mechanisms Among CERTs
  10. Muhammad Mudassar Yamin, Basel Katt. Mobile device management (MDM) technologies, issues and challenges

Prosper Yeng

  1. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Observational measures for effective profiling of healthcare staffs? security practices
  2. Prosper Yeng, Peter Nimbe, Benjamin Asubam Weyori, Terje Solvoll, Bian Yang. Web Vulnerability Measures for SMEs
  3. Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen. K-CUSUM: Cluster Detection Mechanism in EDMON
  4. Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen. K-CUSUM: Cluster Detection Mechanism in EDMON
  5. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
  6. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
  7. Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Ali Saleh Abomhara, Prosper Yeng, Javed Ahmed. Data-driven Intrusion Detection System for Small and Medium Enterprises

Xiaojie Zhu

  1. Xiaojie Zhu, Ayday Erman, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud
  2. Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud

Grethe Østby

  1. Grethe Østby, Basel Katt. Cyber Crisis Management Roles – A Municipality Responsibility Case Study
  2. Grethe Østby, Muhammad Mudassar Yamin, Bilal AlSabbagh. SIEMS in crisis management: Detection, escalation and presentation – a work in progress
  3. Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski. A Socio-Technical Framework to Improve cyber security training: A Work in Progress