Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Debesh Jha

  1. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen. Kvasir-SEG: A Segmented Polyp Dataset
  2. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen. Kvasir-SEG: A Segmented Polyp Dataset

Nektaria Kaloudi

  1. Nektaria Kaloudi, Jingyue Li. The AI-Based Cyber Threat Landscape: A Survey

Benjamin Knox

  1. Ricardo Gregorio Lugo, Benjamin James Knox, Øyvind Jøsok, Stefan Sütterlin. Variable Self-efficacy as a Measurement for Behaviors in Cyber Security Operations
  2. Sjur Johansen Øfsteng, Ina Garthe, Øyvind Jøsok, Silje Knox, Kirsi Marjaana Helkala, Benjamin James Knox, Stian Ellefsen, Bent Rønnestad. No effect of increasing protein intake during military exercise with severe energy deficit on body composition and performance

Per Håkon Meland

  1. Per Håkon Meland, Guttorm Sindre. Cyber Attacks for Sale

Livinus Obiora Nweke

  1. Livinus Obiora Nweke, Stephen Wolthusen. Resilience Analysis of Software-Defined Networks Using Queueing Networks
  2. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes. Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  3. Livinus Obiora Nweke, Stephen Wolthusen. Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
  4. Livinus Obiora Nweke, Stephen Wolthusen. Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
  5. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang. Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
  6. Livinus Obiora Nweke, Stephen Wolthusen. A Review of Asset-Centric Threat Modelling Approaches

Albin Severinson

  1. Lars Albin Severinson, Eirik Rosnes, Alexandre Graell i Amat. Coded Distributed Tracking

Shukun Tokas

  1. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-Based Mechanisms for Privacy-by-Design
  2. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Internet of Things (Revised Version 2)

Muhammad Mudassar Yamin

  1. Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt. Smart Policing for a Smart World Opportunities, Challenges and Way Forward

Prosper Yeng

  1. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes. Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  2. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang. Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices

Jin Zhang

  1. Jin Zhang, Jingyue Li. Testing and verification of neural-network-based safety-critical control software: A systematic literature review

Grethe Østby

  1. Grethe Østby, Kieren N. Lovell, Basel Katt. EXCON Teams in Cyber Security Training
  2. Grethe Østby, Basel Katt. Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
  3. Philip Johannes Brugmans Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby. The Root Causes of Compromised Accounts at the University