Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  2. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  3. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  4. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard

Flávia Dias Casagrande

  1. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi
  2. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach
  2. Samson Yoseph Esayas. Privacy-as-a-Quality Parameter: Some Reflections on the Scepticism
  3. Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law
  4. Samson Yoseph Esayas. Competition in Dissimilarity: Lessons in Privacy from the Facebook/WhatsApp Merger

Seraj Fayyad

  1. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada Cvancarova Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial

Herman Galteland

  1. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking

Vasileios Gkioulos

  1. Vasileios Gkioulos, Stephen Wolthusen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
  2. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  3. Vasileios Gkioulos, Stephen Wolthusen. A Security Policy Infrastructure for Tactical Service Oriented Architectures
  4. Vasileios Gkioulos, Stephen Wolthusen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  5. Vasileios Gkioulos, Stephen Wolthusen. Security Requirements for the Deployment of Services Across Tactical SOA, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017
  6. Vasileios Gkioulos, Stephen Wolthusen, Erko Risthein. TACTICS: Validation of the security framework developed for tactical SOA, Journal of Information Security and Applications
  7. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Desta Haileselassie Hagos

  1. Desta Haileselassie Hagos, Anis Yazidi, Øivind Kure, Paal E. Engelstad. Enhancing security attacks analysis using regularized machine learning techniques

Britta Hale

  1. Britta J. Hale. Deep Web and Dark Web
  2. Britta J. Hale. Signal: What, Why, How
  3. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  4. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  5. Britta Hale. Secure Channels

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks

Ashish Rauniyar

  1. Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang, Soo Young Shin. Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  2. Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
  2. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography

Martin Stokkenes

  1. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters

Bo Sun

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions

Adam Szekeres

  1. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study

Gaute Wangen

  1. Gaute Wangen. Information Security Risk Assessment: A Method Comparison
  2. Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
  3. Gaute Wangen, Christoffer V Hallstensen, Einar Arthur Snekkenes. A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
  4. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  5. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System

Goitom Weldehawaryat

  1. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

Shao-Fang Wen

  1. Shao-Fang Wen, Stewart James Kowalski. A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities