Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Shada Abdullah AlSalamah, Hessah A. AlSalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Ali Saleh Abomhara, Ibrahim Alyahya. Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study
  2. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  3. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  4. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid. Towards Risk-aware Access Control Framework for Healthcare Information Sharing

Vivek Agrawal

  1. Vivek Agrawal. Information Security Risk Management Practices- Community-Based Knowledge Sharing
  2. Vivek Agrawal, Einar Arthur Snekkenes. Secure Benchmarking using Electronic Voting

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Sergii Banin

  1. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  2. Sergii Banin, Geir Olav Dyrkolbotn. Multinomial malware classification via low-level features

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Collecting Network Evidence Using Constrained Approximate Search Algorithms

Flávia Dias Casagrande

  1. Torhild Holthe, Flavia Dias Casagrande, Liv Halvorsrud, Anne Lund. The assisted living project: a process evaluation of implementation of sensor technology in community assisted living. A feasibility study

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Market Power in ‘Zero’ Price Markets and Competition in (Data) Privacy
  2. Samson Yoseph Esayas, Dan Jerker B. Svantesson. Digital Platforms under Fire – What Australia Can Learn from Recent Developments in Europe
  3. Samson Yoseph Esayas. Privacy as a Non-Price Competition Parameter: Theories of Harm in Mergers
  4. Samson Yoseph Esayas. THE SURVEILLANCE SOCIETY: For Profit Surveillance
  5. Samson Yoseph Esayas. The Commercialization of Personal Data and its Theoretical and Practical Implications for Data Privacy Law and Competition Law
  6. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  7. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  8. Samson Yoseph Esayas. The Commercialization of Personal Data and its Implications for Data Privacy Law
  9. Samson Yoseph Esayas. Competition in (Data) Privacy: ‘Zero’ Price Markets, Market Power and the Role of Competition Law
  10. Samson Yoseph Esayas, Angela Daly. The Proposed Australian Consumer Right to Access and Use Data: A European Comparison

Vasileios Gkioulos

  1. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  2. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
  3. Vasileios Gkioulos. Securing Tactical Service Oriented Architectures

Håkon Gunleifsen

  1. Håkon Gunleifsen, Thomas Kemmerich. Security requirements for service function chaining isolation and encryption
  2. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  3. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation

Cristina Heghedus

  1. Anton Shchipanov, Roman Berenblyum, Alexey A. Khrulenko, C. Rong, Cristina Viorica Heghedus, F. Haugsand. Well Data Analytics: from Case Studies to Solutions
  2. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Informatics Applicability; Machine Learning and Deep Learning
  3. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Load Forecasting Using Deep Learning

Debesh Jha

  1. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen. Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract

Yao Jiang

  1. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang. Offline Assisted Group Key Exchange

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces

Farzane Karami

  1. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani. An Evaluation of Interaction Paradigms for Active Objects
  2. Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen. The Future Mechanism and Information Flow Security

Ali Khodabakhsh

  1. Erwin Haasnoot, Ali Khodabakhsh, Chris Zeinstra, Luuk Spreeuwers, Raymond N.J. Veldhuis. FEERCI: A Package for Fast Non-Parametric Confidence Intervals for Equal Error Rates in Amortized O(m log n)
  2. Ali Khodabakhsh, Erwin Haasnoot, Patrick Bours. Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics
  3. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?
  4. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. a taxonomy of Audiovisual Fake Multimedia Content Creation Technology

Benjamin Knox

  1. Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo. Cognitive Profiles of Female Cyber Defence Operators
  2. Benjamin James Knox. The effect of cyberpower on institutional development in Norway
  3. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
  4. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
  5. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala. Macrocognitive approaches on Cyber Performance
  6. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark. An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  7. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen. Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  8. Benjamin James Knox. A Pathway to Educating Cyberpower in the Norwegian Defence
  9. Benjamin James Knox. Hvorfor koble lederskap med cybermakt…?
  10. Øyvind Jøsok, Benjamin James Knox. Ledelse i cyberdomenet
  11. Kirsi Marjaana Helkala, Benjamin James Knox. Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
  12. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok. Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  13. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin. Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  14. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition

Siddhartha Kumar

  1. Siddhartha Kumar. Privacy, Security, and Repair in Distributed Storage Systems

Vasileios Mavroeidis

  1. Vasileios Mavroeidis, Kamer Vishi, Mateusz D Zych, Audun Jøsang. The impact of quantum computing on present cryptography

Per Håkon Meland

  1. Ørnulf Jan Rødseth, Per Håkon Meland, Christian Frøystad, Ovidiu Valentin Drugan. PKI vs. Blockchain when Securing Maritime Operations
  2. Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth. Visualizing cyber security risks with bow-tie diagrams

Kalpanie Mendis

  1. Handunneththi V. Kalpanie Mendis. 5G enabling digitalization of the distribution grid

Maghsoud Morshedi Chinibolagh

  1. Raheleh Kari, Henrique Murilo Gaspar, Anne Haugen Gausdal, Maghsoud Morshedi. Human Interactions Framework for Remote Ship Operations

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Mariusz Nowostawski. Split payments in payment networks

Kyle Porter

  1. Kyle Porter, Slobodan Petrovic. Obtaining precision-recall trade-offs in fuzzy searches of large email corpora
  2. Kyle Porter. Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling
  3. Kyle Porter, Slobodan Petrovic. Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora

Ashish Rauniyar

  1. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF energy harvesting and information transmission based on NOMA for wireless powered IoT relay systems
  2. Ashish Rauniyar, Paal E. Engelstad, Hans Jonas Fossum Moen. A New Distributed Localization Algorithm Using Social Learning Based Particle Swarm Optimization for Internet of Things
  3. Ashish Rauniyar, Soo Young Shin. Cooperative spectrum sensing based on adaptive activation of energy and preamble detector for cognitive radio networks
  4. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Andrii Shalaginov

  1. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  2. Andrii Shalaginov. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Large-scale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic

Kashif Habib Sheikh

  1. Kashif Habib, Wolfgang Leister, Einar Arthur Snekkenes, Ilangko Balasingham. Context-Aware Adaptive Authentication for the IoT in eHealth

Manish Shrestha

  1. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Bo Sun

  1. Bo Sun, Sigurd Skogestad, Junguo Lu, Weidong Zhang. Dual SIMC-PI Controller Design for Cascade Implement of Input Resetting Control with Application
  2. Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun. On Upper Bounds for Algebraic Degrees of APN Functions
  3. Bo Sun, Lilya Budaghyan. On Classification and Some Properties of APN Functions

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Adam Szekeres

  1. Adam Szekeres, Einar Arthur Snekkenes. Unobtrusive Psychological Profiling for Risk Analysis

Shukun Tokas

  1. Shukun Tokas, Toktam Ramezanifarkhani. Language-Based Support for GDPR-Related Privacy Requirements
  2. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas. A secrecy-preserving language for distributed and object-oriented systems

Kamer Vishi

  1. Vasileios Mavroeidis, Kamer Vishi, Mateusz D Zych, Audun Jøsang. The impact of quantum computing on present cryptography

Pankaj Wasnik

  1. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?

Shao-Fang Wen

  1. Shao-Fang Wen. Security Knowledge Management in Open Source Software Communities
  2. Shao-Fang Wen. An Ontology-Based Context Model for Managing Security Knowledge in Software Development
  3. Shao-Fang Wen. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities
  4. Shao-Fang Wen. Software Security Knowledge Transferring and Learning with Concept Maps
  5. Shao-Fang Wen. Learning Secure Programming in Open Source Software Communities: A Socio-Technical View

Tetiana Yarygina

  1. Tetiana Yarygina, Christian W. Otterstad. A Game of Microservices: Automated Intrusion Response
  2. Tetiana Yarygina, Anya Helene Bagge. Overcoming Security Challenges in Microservice Architectures
  3. Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi. Exploring Microservice Security

Jin Zhang

  1. Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?

Xiaojie Zhu

  1. Ping Shen, Chi Chen, Xiaojie Zhu. Privacy-preserving relevance ranking scheme and its application in multi-keyword searchable encryption
  2. Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud