Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Vivek Agrawal

  1. Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice

Flávia Dias Casagrande

  1. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi
  2. Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach
  2. Samson Yoseph Esayas. Privacy-as-a-Quality Parameter: Some Reflections on the Scepticism
  3. Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law

Seraj Fayyad

  1. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada Cvancarova Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial

Herman Galteland

  1. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack

Vasileios Gkioulos

  1. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives

Britta Hale

  1. Britta J. Hale. Deep Web and Dark Web
  2. Britta J. Hale. Signal: What, Why, How
  3. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  4. Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
  5. Britta Hale. Secure Channels

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  2. Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU

Ctirad Sousedik

  1. Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
  2. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography

Bo Sun

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions

Gaute Wangen

  1. Gaute Wangen. Information Security Risk Assessment: A Method Comparison
  2. Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
  3. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System

Goitom Weldehawaryat

  1. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security