Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  2. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  3. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid. Towards Risk-aware Access Control Framework for Healthcare Information Sharing

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Network Forensics with Snort: Collecting More Evidence Using Constrained Approximate Search

Vasileios Gkioulos

  1. Vasileios Gkioulos. Securing Tactical Service Oriented Architectures

Håkon Gunleifsen

  1. Håkon Gunleifsen. Security requirements for service function chaining isolation and encryption
  2. Håkon Gunleifsen. A Tiered Control Plane Model for Service Function Chaining Isolation

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces

Ali Khodabakhsh

  1. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. a taxonomy of Audiovisual Fake Multimedia Content Creation Technology

Benjamin Knox

  1. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala. Macrocognitive approaches on Cyber Performance
  2. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark. An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  3. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen. Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  4. Benjamin James Knox. A Pathway to Educating Cyberpower in the Norwegian Defence
  5. Benjamin James Knox. Hvorfor koble lederskap med cybermakt…?
  6. Øyvind Jøsok, Benjamin James Knox. Ledelse i cyberdomenet
  7. Kirsi Marjaana Helkala, Benjamin James Knox. Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
  8. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok. Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  9. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin. Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  10. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition

Kyle Porter

  1. Kyle Porter, Slobodan Petrovic. Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora

Ashish Rauniyar

  1. Ashish Rauniyar, Soo Young Shin. Cooperative spectrum sensing based on adaptive activation of energy and preamble detector for cognitive radio networks
  2. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Andrii Shalaginov

  1. Andrii Shalaginov. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Large-scale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic

Manish Shrestha

  1. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Shukun Tokas

  1. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas. A secrecy-preserving language for distributed and object-oriented systems

Shao-Fang Wen

  1. Shao-Fang Wen. Software Security Knowledge Transferring and Learning with Concept Maps
  2. Shao-Fang Wen. An empirical study on software security knowledge sharing and learning in open source communities
  3. Shao-Fang Wen. Learning Secure Programming in Open Source Software Communities: A Socio-Technical View

Xiaojie Zhu

  1. Ping Shen, Chi Chen, Xiaojie Zhu. Privacy-preserving relevance ranking scheme and its application in multi-keyword searchable encryption
  2. Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud