Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  2. Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  3. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
  4. Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard

Flávia Dias Casagrande

  1. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi
  2. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach
  2. Samson Yoseph Esayas. Privacy-as-a-Quality Parameter of Competition: Some Reflections on the Scepticism
  3. Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law
  4. Samson Yoseph Esayas. Competition in Dissimilarity: Lessons in Privacy from the Facebook/WhatsApp Merger

Seraj Fayyad

  1. Seraj Fayyad, Josef Noll. A Framework for Measurability of Security
  2. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial

Herman Galteland

  1. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking

Vasileios Gkioulos

  1. Vasileios Gkioulos, Stephen Wolthusen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
  2. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  3. Vasileios Gkioulos, Stephen Wolthusen. A Security Policy Infrastructure for Tactical Service Oriented Architectures
  4. Vasileios Gkioulos, Stephen Wolthusen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  5. Vasileios Gkioulos, Stephen Wolthusen. Security Requirements for the Deployment of Services Across Tactical SOA, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017
  6. Vasileios Gkioulos, Stephen Wolthusen, Erko Risthein. TACTICS: Validation of the security framework developed for tactical SOA, Journal of Information Security and Applications
  7. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Desta Haileselassie Hagos

  1. Desta Haileselassie Hagos, Anis Yazidi, Øivind Kure, Paal E. Engelstad. Enhancing security attacks analysis using regularized machine learning techniques

Britta Hale

  1. Britta J. Hale. Deep Web and Dark Web
  2. Britta J. Hale. Signal: What, Why, How
  3. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT key exchange with full forward secrecy
  4. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  5. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  6. Britta Hale. Secure Channels

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks

Vasileios Mavroeidis

  1. Vasileios Mavroeidis, Nicho Mathew. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks

Christian Otterstad

  1. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices
  2. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole. Selected x86 Low-level Attacks and Mitigations

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. A Collusion Attack on the Lightning Network — Implications for Forensics
  2. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. Digital Forensic Implications of Collusion Attacks on the Lightning Network

Ashish Rauniyar

  1. Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang, Soo Young Shin. Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  2. Andrii Shalaginov. Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection
  3. Andrii Shalaginov. Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
  4. Andrii Shalaginov. Fuzzy Logic Model for Digital Forensics: A Trade-off between Accuracy, Complexity and Interpretability
  5. Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of fingerprints captured using optical coherence tomography
  2. Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
  3. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography

Martin Stokkenes

  1. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters

Bo Sun

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions
  2. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. DUBLETT

Adam Szekeres

  1. Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study

Gaute Wangen

  1. Gaute Wangen. Information Security Risk Assessment: A Method Comparison
  2. Gaute Wangen, Niclas Hellesen, Henrik Torres, Erlend Brækken. An Empirical Study of Root-Cause Analysis in Information Security Management
  3. Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
  4. Gaute Wangen, Christoffer V Hallstensen, Einar Arthur Snekkenes. A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
  5. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
  6. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System
  2. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones

Goitom Weldehawaryat

  1. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

Shao-Fang Wen

  1. Shao-Fang Wen, Stewart James Kowalski. A case study: Heartbleed vulnerability management and Swedish municipalities
  2. Shao-Fang Wen, Stewart James Kowalski. A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities

Tetiana Yarygina

  1. Tetiana Yarygina. RESTful Is Not Secure
  2. Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices