Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Shada Abdullah AlSalamah, Hessah A. AlSalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Ali Saleh Abomhara, Ibrahim Alyahya. Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study
  2. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  3. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  4. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid. Towards Risk-aware Access Control Framework for Healthcare Information Sharing

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. Secure Benchmarking using Electronic Voting

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Sergii Banin

  1. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  2. Sergii Banin, Geir Olav Dyrkolbotn. Multinomial malware classification via low-level features

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Collecting Network Evidence Using Constrained Approximate Search Algorithms

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Market Power in ‘Zero’ Price Markets and Competition in (Data) Privacy
  2. Samson Yoseph Esayas, Dan Jerker B. Svantesson. Digital Platforms under Fire – What Australia Can Learn from Recent Developments in Europe
  3. Samson Yoseph Esayas. Privacy as a Non-Price Competition Parameter: Theories of Harm in Mergers
  4. Samson Yoseph Esayas. THE SURVEILLANCE SOCIETY: For Profit Surveillance
  5. Samson Yoseph Esayas. The Commercialization of Personal Data and its Theoretical and Practical Implications for Data Privacy Law and Competition Law
  6. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  7. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  8. Samson Yoseph Esayas. The Commercialization of Personal Data and its Implications for Data Privacy Law
  9. Samson Yoseph Esayas. Competition in (Data) Privacy: ‘Zero’ Price Markets, Market Power and the Role of Competition Law
  10. Samson Yoseph Esayas, Angela Daly. The Proposed Australian Consumer Right to Access and Use Data: A European Comparison

Vasileios Gkioulos

  1. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  2. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
  3. Vasileios Gkioulos. Securing Tactical Service Oriented Architectures

Håkon Gunleifsen

  1. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  2. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
  3. Håkon Gunleifsen. Security requirements for service function chaining isolation and encryption
  4. Håkon Gunleifsen. A Tiered Control Plane Model for Service Function Chaining Isolation

Cristina Heghedus

  1. Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong. Energy Informatics Applicability; Machine Learning and Deep Learning
  2. Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong. Energy Load Forecasting Using Deep Learning

Debesh Jha

  1. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen. Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces

Ali Khodabakhsh

  1. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. a taxonomy of Audiovisual Fake Multimedia Content Creation Technology

Benjamin Knox

  1. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
  2. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
  3. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala. Macrocognitive approaches on Cyber Performance
  4. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark. An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  5. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen. Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  6. Benjamin James Knox. A Pathway to Educating Cyberpower in the Norwegian Defence
  7. Benjamin James Knox. Hvorfor koble lederskap med cybermakt…?
  8. Øyvind Jøsok, Benjamin James Knox. Ledelse i cyberdomenet
  9. Kirsi Marjaana Helkala, Benjamin James Knox. Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
  10. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok. Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  11. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin. Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  12. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition

Per Håkon Meland

  1. Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth. Visualizing cyber security risks with bow-tie diagrams

Maghsoud Morshedi Chinibolagh

  1. Raheleh Kari, Henrique Murilo Gaspar, Anne Haugen Gausdal, Maghsoud Morshedi. Human Interactions Framework for Remote Ship Operations

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Mariusz Nowostawski. Split payments in payment networks

Kyle Porter

  1. Kyle Porter, Slobodan Petrovic. Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora

Ashish Rauniyar

  1. Ashish Rauniyar, Paal E. Engelstad, Hans Jonas Fossum Moen. A New Distributed Localization Algorithm Using Social Learning Based Particle Swarm Optimization for Internet of Things
  2. Ashish Rauniyar, Soo Young Shin. Cooperative spectrum sensing based on adaptive activation of energy and preamble detector for cognitive radio networks
  3. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Andrii Shalaginov

  1. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  2. Andrii Shalaginov. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Large-scale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic

Manish Shrestha

  1. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Bo Sun

  1. Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun. On Upper Bounds for Algebraic Degrees of APN Functions
  2. Bo Sun, Lilya Budaghyan. On Classification and Some Properties of APN Functions

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  2. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  3. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Adam Szekeres

  1. Adam Szekeres, Einar Arthur Snekkenes. Unobtrusive Psychological Profiling for Risk Analysis

Shukun Tokas

  1. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas. A secrecy-preserving language for distributed and object-oriented systems

Shao-Fang Wen

  1. Shao-Fang Wen. An Ontology-Based Context Model for Managing Security Knowledge in Software Development
  2. Shao-Fang Wen. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities
  3. Shao-Fang Wen. Software Security Knowledge Transferring and Learning with Concept Maps
  4. Shao-Fang Wen. Learning Secure Programming in Open Source Software Communities: A Socio-Technical View

Tetiana Yarygina

  1. Tetiana Yarygina, Christian W. Otterstad. A Game of Microservices: Automated Intrusion Response
  2. Tetiana Yarygina, Anya Helene Bagge. Overcoming Security Challenges in Microservice Architectures
  3. Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi. Exploring Microservice Security

Jin Zhang

  1. Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?

Xiaojie Zhu

  1. Ping Shen, Chi Chen, Xiaojie Zhu. Privacy-preserving relevance ranking scheme and its application in multi-keyword searchable encryption
  2. Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud