Below you can see the research output generated by Ph.D. student members of COINS.
Doney Abraham
- Sule Yildirim Yayilgan, Filip Holik, Mohamed Abomhara, Doney Abraham, Alemayehu Gebremedhin. A Comprehensive Methodology for Analyzing Cyber Security Threats and Attacks in IoT based Power Networks: A Case Study of Digital Substation in Norway (PUBLICATION IS UNDER REVIEW)
- Filip Holik, Doney Abraham, Sule Yildirim Yayilgan. Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations
- Doney Abraham, Sule Yildirim Yayilgan, Mohamed Abomhara, Alemayehu Gebremedhin, Fisnik Dalipi. Security and Privacy issues in IoT based Smart Grids: A case study in a digital substation
Aida Akbarzadeh
- Aida Akbarzadeh, Sokratis Katsikas. Unified IT&OT Modeling for Cybersecurity Analysis of Cyber-Physical Systems
Ahmed Amro
- Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Navigation Data Anomaly Analysis and Detection
Martha Norberg Hovd
- Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum. On the IND-CCA1 Security of FHE Schemes
Livinus Obiora Nweke
- Livinus Obiora Nweke. Using Formal Methods for Modelling Cyber-Physical Systems Security
- Livinus Obiora Nweke, Mohamed Abomhara, Sule Yildirim Yayilgan, Debora Camparin, Olivier Heurtier, Calum Bunney. A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
- Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen. Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466))
- Livinus Obiora Nweke, Anthony Junior Bokolo, Gibson Mba, Emeka Nwigwe. Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
Aybars Oruc
- Aybars Oruc. Ethical Considerations in Maritime Cybersecurity Research
- Aybars Oruc. Tools for Organizing an Effective Virtual Academic Conference
- Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Navigation Data Anomaly Analysis and Detection
- Aybars Oruc. Potential Cyber Threats, Vulnerabilities, and Protections of Unmanned Vehicles
- Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas. Towards a Cyber-Physical Range for the Integrated Navigation System
Muhammad Mudassar Yamin
- Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt, Mohammad Hijji, Khan Muhammad. Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
- Muhammad Mudassar Yamin, Espen Torseth, Laszlo Erdodi, Basel Katt. Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
- Muhammad Mudassar Yamin. COVID Truthers Have Found a New ‘Pandemic’ to Freak Out About
- Muhammad Mudassar Yamin. Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges
- Muhammad Mudassar Yamin, Basel Katt. Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges
Grethe Østby
- Grethe Østby, Stewart James Kowalski. Introducing Serious Games as a Master Course in Information Security Management Programs: Moving Towards Socio-Technical Incident Response Learning