Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg. Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  2. Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
  3. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  4. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  5. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard
  6. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  7. Vivek Agrawal, Einar Arthur Snekkenes. Utfordringer og muligheter for deling av informasjon innen Cyber Security
  8. Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
  9. Vivek Agrawal, Einar Arthur Snekkenes. UnRizkNow: A community of practice for information security risk practitioners
  10. Vivek Agrawal, Einar Arthur Snekkenes. Creating a successful Communities of practice
  11. Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
  12. Vivek Agrawal. Secure migration to the cloud
  13. Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
  14. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  15. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  16. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard

Jayachander Surbiryala

  1. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras
  2. Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
  3. Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing

Hamed Arshad

  1. Hamed Arshad, Morteza Nikooghadam, S Avezverdi, M Nazari. Design and FPGA implementation of an efficient security mechanism for mobile pay TV systems
  2. A Irshad, S Kumari, X Li, F Wu, S A Chaudhry, Hamed Arshad. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
  3. Hamed Arshad, R Abbas. A secure authentication and key agreement scheme for roaming service with user anonymity

Chris Carr

  1. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines. Key recovery: Inert and public

Flávia Dias Casagrande

  1. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi
  2. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach
  2. Samson Yoseph Esayas. Privacy-as-a-Quality Parameter of Competition: Some Reflections on the Scepticism
  3. Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law
  4. Samson Yoseph Esayas. Competition in Dissimilarity: Lessons in Privacy from the Facebook/WhatsApp Merger

Seraj Fayyad

  1. Seraj Fayyad, Josef Noll. A Framework for Measurability of Security
  2. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial

Herman Galteland

  1. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking

Harsha Sandaruwan Gardiyawasam Pussewalage

  1. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Attribute Based Access Control Scheme with Controlled Access Delegation for Collaborative E-health Environments

Vasileios Gkioulos

  1. Vasileios Gkioulos, Stephen Wolthusen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
  2. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  3. Vasileios Gkioulos, Stephen Wolthusen. A Security Policy Infrastructure for Tactical Service Oriented Architectures
  4. Vasileios Gkioulos, Stephen Wolthusen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  5. Vasileios Gkioulos, Stephen Wolthusen. Security Requirements for the Deployment of Services Across Tactical SOA
  6. Vasileios Gkioulos, Stephen Wolthusen, Erko Risthein. TACTICS: Validation of the security framework developed for tactical SOA, Journal of Information Security and Applications
  7. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Desta Haileselassie Hagos

  1. Desta Haileselassie Hagos, Anis Yazidi, Øivind Kure, Paal E. Engelstad. Enhancing security attacks analysis using regularized machine learning techniques

Britta Hale

  1. Britta J. Hale. Deep Web and Dark Web
  2. Britta J. Hale. Signal: What, Why, How
  3. Britta Hale. Sikkerhet i en digital verden med hackere hakk i hæl
  4. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT key exchange with full forward secrecy
  5. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  6. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  7. Britta Hale. Secure Channels

Håkon Jacobsen

  1. Håkon Jacobsen. A Modular Security Analysis of EAP and IEEE 802.11
  2. Chris Brzuska, Håkon Jacobsen. A modular security analysis of EAP and IEEE 802.11

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks

Farzane Karami

  1. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures
  2. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures

Vasileios Mavroeidis

  1. Vasileios Mavroeidis, Nicho Mathew. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks

Maghsoud Morshedi Chinibolagh

  1. Maghsoud Morshedi, Hårek Haugerud, Kyrre Begnum. Making the Case for Highly Efficient Multicore Enabled Unikernels With IncludeOS

Christian Otterstad

  1. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices
  2. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole. Selected x86 Low-level Attacks and Mitigations

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. A Collusion Attack on the Lightning Network — Implications for Forensics
  2. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. Digital Forensic Implications of Collusion Attacks on the Lightning Network

Ashish Rauniyar

  1. Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang, Soo Young Shin. Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things

Felix Schuckert

  1. Felix Schuckert, Basel Katt, Hanno Langweg. Source Code Patterns of SQL Injection Vulnerabilities

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  2. Andrii Shalaginov. Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection
  3. Andrii Shalaginov. Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
  4. Andrii Shalaginov. Fuzzy Logic Model for Digital Forensics: A Trade-off between Accuracy, Complexity and Interpretability
  5. Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
  2. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography

Martin Stokkenes

  1. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters

Bo Sun

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions

Jayachander Surbiryala

  1. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras
  2. Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
  3. Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing

Adam Szekeres

  1. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  2. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study

Shukun Tokas

  1. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things
  2. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things

Gaute Wangen

  1. Gaute Wangen. Information Security Risk Assessment: A Method Comparison
  2. Gaute Wangen, Niclas Hellesen, Erlend Brækken, Henrik Torres. An Empirical Study of Root-Cause Analysis in Information Security Management
  3. Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
  4. Gaute Wangen, Christoffer V Hallstensen, Einar Arthur Snekkenes. A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
  5. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  6. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System
  2. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones

Goitom Weldehawaryat

  1. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

Shao-Fang Wen

  1. Shao-Fang Wen, Stewart James Kowalski. A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities

Tetiana Yarygina

  1. Tetiana Yarygina. RESTful Is Not Secure
  2. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices