Below you can see the research output generated by Ph.D. student members of COINS.
Mohamed Abomhara
- Mohamed Ali Saleh Abomhara, Martin Gerdes, Geir Myrdahl Køien. A STRIDE-Based Threat Model for Telehealth Systems
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
Bikash Agrawal
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski. AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski. Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
- Bikash Agrawal, Tomasz Wiktorski, Rong Chunming. Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: A framework to analyse open TSDB Time-series data in HBase
Vivek Agrawal
- Thomas Kemmerich, Vivek Agrawal, Carsten Momsen. Secure migration to the cloud—In and out
- Vivek Agrawal. Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Waqas Aman
- Waqas Aman, Einar Snekkenes. Managing Security Trade-offs in the Internet of Things using Adaptive Security
- Waqas Aman, Einar Snekkenes. EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
Maria Bartnes
- Ingrid Graffer, Maria Bartnes, Karin Bernsmed. Play2Prepare: A Board Game Supporting IT Security Preparedness Exercises for Industrial Control Organizations
- Maria Bartnes, Inger Anne Tøndel, Martin Gilje Jaatun. Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations
- Maria Bartnes Line. Understanding information security incident management practices: A case study in the electric power industry
- Haakon Barstad, Maria Bartnes Line. IT-sikkerheten ikke prioritert
- Maria Bartnes Line, Nils Brede Moe. Cross-functional Teams Needed for Managing Information Security Incidents in Complex Systems
- Maria Bartnes Line. IT security preparedness exercises in the electric power industry
- Maria Bartnes Line, Nils Brede Moe. Understanding Collaborative Challenges in IT Security Preparedness Exercises
- Erlend Andreas Gjære, Martin Gilje Jaatun, Per Håkon Meland, Inger Anne Tøndel, Karin Bernsmed, Marie Elisabeth Gaup Moe, Maria Bartnes Line. Blogg fra SINTEF forskningsgruppe informasjonssikkerhet
- Maria Bartnes Line, Nils Brede Moe. Norske nettselskaper øver ikke på IT-angrep
- Maria Bartnes Line, Nils Brede Moe. Nettselskaper øver ikke på IT-angrep
- Maria Bartnes Line, Nils Brede Moe. Sjefen må være med på beredskapsøvelser
- Maria Bartnes Line, Nils Brede Moe. El-nettselskaper øver ikke på IT-angrep
- Atle Abelsen, Maria Bartnes Line, Nils Brede Moe. Få øver beredskap
- Inger Anne Tøndel, Maria Bartnes Line, Gorm Idar Johansen. Assessing Information Security Risks of AMI: What Makes it so Difficult?
- Maria Bartnes Line, Nils Brede Moe. Hvorfor øves det så lite på IT-kriser?
Chris Carr
- Britta Hale, Christopher Alan Carr, Danilo Gligoroski. CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
Antorweep Chakravorty
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: A framework to analyse open TSDB Time-series data in HBase
Ambika Chitrakar
- Ambika Shrestha Chitrakar, Slobodan Petrovic. Approximate search with constraints on indels with application in SPAM filtering
Samson Yoseph Esayas
- Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjørnstad, Veda Brubakk. An integrated method for compliance and risk assessment
- Samson Yoseph Esayas. The Role of Anonymisation and Pseudonymisation under the EU Data Privacy Rules: Beyond the ‘All or Nothing’ Approach
- Samson Yoseph Esayas. An Integrated Method for Compliance and Risk Assessment: Experiences from a Case Study
- Samson Yoseph Esayas, Tobias Mahler. Modelling compliance risk: a structured approach
- Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler. Using Technology to Enhance Confidentiality and Regulatory Compliance by Design
- Samson Yoseph Esayas, Tobias Mahler, Bjørnar Solhaug. An Integrated Approach for Compliance and Security Risk Assessment
- Samson Yoseph Esayas. Breach Notification Requirements under the European Union Legal Framework: Convergence, Conflicts and Complexity in Compliance
- Samson Yoseph Esayas. The Role of Anonymisation and Pseudonymisation under the EU Data Privacy Rules
Stian Fauskanger
- Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Stian Fauskanger. Policy-Based Labelling: A Flexible Framework for Trusted Data Labelling
- Stian Fauskanger, Igor A. Semaev. Statistical and Algebraic Properties of DES
Seraj Fayyad
- Seraj Fayyad, Josef Noll. Components Interconnection Consideration In Multi Metrics Approach
- Seraj Fayyad, Josef Noll. Components Interconnection Consideration In Multi Metrics Approach
- Iñaki Garitano, Seraj Fayyad, Josef Noll. Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
- Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie. Measurable Security, Privacy and Dependability in Smart Grids
Samson Gejibo
- Samson Hussien Gejibo, Khalid Azim Mughal. Towards a Secure Framework for mHealth. A Case Study in Mobile Data Collection Systems
Vasileios Gkioulos
- Vasileios Gkioulos, Stephen Wolthusen. Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks
Britta Hale
- Britta Hale. Implications between Authentication Levels and Secure Termination
- Britta Hale, Christopher Alan Carr, Danilo Gligoroski. CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
Kjetil Kjernsmo
- Kjetil Kjernsmo. LWP::UserAgent::CHICaching
- Kjetil Kjernsmo. RDF::NS::Curated
- Kjetil Kjernsmo. Attean SPARQL Store
- Kjetil Kjernsmo, Ruben Verborgh. How can scientific methods provide guidance for Semantic Web Research and Development?
- Kjetil Kjernsmo. Experimental prefetching SPARQL query cacher
- Kjetil Kjernsmo. How can scientific methods provide guidance for Semantic Web Research and Development?
- Kjetil Kjernsmo. A Survey of HTTP Caching Implementations on the Open Semantic Web
- Kjetil Kjernsmo. A Survey of HTTP Caching Implementations on the Open Semantic Web
- Kjetil Kjernsmo. Addendum to a survey of HTTP caching on the Semantic Web
Guoqiang Li
- Guoqiang Li, Bian Yang, Christoph Busch. A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
- Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch. Towards generating protected fingerprint templates based on bloom filters
- Guoqiang Li, Bian Yang, Christoph Busch. A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
Yan Li
- Katsiaryna Labunets, Yan Li, Fabio Massacci, Federica Paci, Martina Ragosta, Bjørnar Solhaug, Ketil Stølen, Alessandra Tedeschi. Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models
Yi-Ching Liao
- Yi-Ching Liao, Hanno Langweg. Events and causal factors charting of kernel traces for root cause analysis
- Yi-Ching Liao. A Survey of Software-Based String Matching Algorithms for Forensic Analysis
- Yi-Ching Liao, Hanno Langweg. Developing Metrics for Surveillance Impact Assessment
Edlira Martiri
- Edlira Nepravishta Martiri. Privacy Preserving Biometrics and Duplicate Enrolment Check
- Bian Yang, Edlira Nepravishta Martiri. Using Honey Templates to Augment Hash Based Biometric Template Protection
- Edlira Nepravishta Martiri, Bian Yang, Christoph Busch. Protected Honey Face Templates
Soumik Mondal
- Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours. Keystroke Dynamics Performance Enhancement With Soft Biometrics
- Soumik Mondal, Patrick Bours. Context independent continuous authentication using behavioural biometrics
- John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia. One-handed Keystroke Biometric Identification Competition
- Soumik Mondal, Patrick Bours. Continuous authentication and identification for mobile devices: Combining security and forensics
- Soumik Mondal, Patrick Bours. Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device
- Patrick Bours, Soumik Mondal. Performance evaluation of continuous authentication systems
- Patrick Bours, Soumik Mondal. Continuous Authentication with Keystroke Dynamics
- Soumik Mondal, Patrick Bours. Swipe Gesture based Continuous Authentication for Mobile Devices
- Soumik Mondal, Patrick Bours. Continuous Authentication in a Real World Settings
- Soumik Mondal, Patrick Bours. A Computational Approach to the Continuous Authentication Biometric System
Martin Aastrup Olsen
- Martin Aastrup Olsen, Marek Dusio, Christoph Busch. Fingerprint skin moisture impact on biometric performance
- Carsten Gottschlich, Anna Mikaelyan, Martin Aastrup Olsen, Josef Bigun, Christoph Busch. Improving Fingerprint Alteration Detection
- Martin Aastrup Olsen, Martin Böckeler, Christoph Busch. Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments
Pankaj Pandey
- Pankaj Pandey, Einar Snekkenes. A Performance Assessment Metric for Information Security Financial Instruments
- Pankaj Pandey. “CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS WITH OVERALL ORGANIZATIONAL STRATEGY
- Pankaj Pandey, Steven DeHaes. A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk
- Pankaj Pandey, Steven De Haes. Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks
- Pankaj Pandey, Steven De Haes. A Novel Financial Instrument to Incentivize Investments in Information Security Controls and Mitigate Residual Risk
- Pankaj Pandey, Einar Snekkenes. Design and Performance Aspects of Information Security Prediction Markets for Risk Management
Jan Roksvold
- Vibeke Os, Jan Nyquist Roksvold. Ren matematikk
- Jan Nyquist Roksvold. Some combinatorial invariants determined by Betti numbers of Stanley-Reisner ideals
- Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure. Betti numbers associated to the facet ideal of a matroid
Simona Samardjiska
- Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae. A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
- Simona Samardjiska, Danilo Gligoroski. Approaching maximum embedding efficiency on small covers using Staircase-Generator codes
- Simona Samardjiska. Multivariate Public Key Cryptosystems Produced by Quasigroups
Andrii Shalaginov
- Andrii Shalaginov, Katrin Franke. Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy
- Andrii Shalaginov. Application of Computational Intelligence for Digital Forensics
- Andrii Shalaginov. Automated generation of the human-understandable rules from network traffic dumps
- Andrii Shalaginov, Katrin Franke. Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations
- Andrii Shalaginov, Katrin Franke. Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications
- Andrii Shalaginov, Katrin Franke. A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
- Andrii Shalaginov, Katrin Franke. A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications
Kashif Habib Sheikh
- Kashif Habib, Wolfgang Leister. Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures
- Kashif Habib, Wolfgang Leister. Context-Aware Authentication for the Internet of Things
- Kashif Habib, Arild Braathen Torjusen, Wolfgang Leister. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth
Berglind Smaradottir
- Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: user-centred design and evaluation of a collaborative information system for a Norwegian telehealth service
- Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: User-Centred Design and Evaluation of a Collaborative Information System for a Norwegian Telehealth Service
- Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Rune Werner Fensli. eHealth-extended Care Coordination: Development of a Collaborative System for Inter-municipal Dementia Teams- A research project with a user-centered design approac
- Berglind Smaradottir, Jarle Audun Håland, Santiago Martinez, Åsmund Rodvig Somdal, Rune Werner Fensli. Recommendations of a Test Infrastructure for Evaluation of Touchscreen Assistive Technology for Visually Impaired Users
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User Interface Development of a COPD Remote Monitoring Application- A User-centred Design Process
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of a COPD Remote Monitoring Application
- Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Rune Werner Fensli. eHealth-extended Care Coordination: Development of a Collaborative System for Inter-municipal Dementia Teams- A research project with a user-centered design approach
- Berglind Smaradottir. Brukermedvirkning i utviklingen av en telemedisinsk applikasjon for KOLS-pasienter
- Berglind Smaradottir. Brukermedvirkning ved utvikling og evaluering av systemer, Erfaringer fra United4Health prosjektet
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User-Centered Design of a COPD Remote Monitoring Application Experiences from the EU-project United4Health
- Berglind Smaradottir. Brukermedvirkning ved utvikling og evaluering av systemer. Erfaringer fra prosjektet United4Health ved Senter for eHelse
- Berglind Smaradottir. Presentasjon av forskning ved Senter for eHelse og velferdsteknologi. Erfaringer fra prosjektet United4Health.
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability evaluation of a COPD remote monitoring application
- Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
- Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: User-Centred Design and Evaluation of a Collaborative Information System for a Norwegian Telehealth Service
- Berglind Smaradottir, Jarle Audun Håland, Santiago Martinez, Åsmund Rodvig Somdal, Rune Werner Fensli. Recommendations on a Test Infrastructure for Evaluation of Touchscreen Assistive Technology for Visually Impaired Users
- Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. User-Centred Design of an Information System for a Norwegian Telehealth Service
- Berglind Smaradottir, Santiago Martinez. Brukermedvirkning i utforming og evaluering av velferdsteknologi. Erfaringer fra United4Health-prosjektet
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of a COPD Remote Monitoring Application
- Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
- Berglind Smaradottir, Martin Gerdes, Rune Werner Fensli, Santiago Martinez. User Interface Development of a COPD Remote Monitoring Application A User-centred Design Process
- Berglind Smaradottir. Presentasjon av forskning ved Senter for eHelse- Erfaringer fra prosjektet United4Health.
- Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. User-Centred Design of the User Interface of a Collaborative Information System for Inter-Municipal Dementia Team
- Martin Gerdes, Berglind Smaradottir, Frank Reichert, Rune Werner Fensli. Telemedicine and Cooperative Remote Healthcare Services: COPD Field Trial
- Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. User-Centred Design of the User Interface of a Collaborative Information System for Inter-Municipal Dementia Team
Ctirad Sousedik
- Ralph Breithaupt, Ctirad Sousedik, Sven Meissner. Full fingerprint scanner using optical coherence tomography
Martin Stokkenes
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch. Fusion of Face and Periocular Information for Improved Authentication on Smartphones
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch. Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
Aryan TaheriMonfared
- Aryan TaheriMonfared, Chunming Rong. Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants
Mohsen Toorani
- Mohsen Toorani, Øyvind Ytrehus. Security protocols and related topics
- Mohsen Toorani. Interactive Information Theory
- Mohsen Toorani. Security Protocols and Provable Security
- Mohsen Toorani. On vulnerabilities of the security association in the IEEE 802.15.6 standard
- Mohsen Toorani. Cryptanalysis of a Protocol from FC’10
- Mohsen Toorani. Cryptanalysis of two PAKE protocols for body area networks and smart environments
- Mohsen Toorani. On Continuous After-the-Fact Leakage-Resilient Key Exchange
- Mohsen Toorani. On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
- Mohsen Toorani. Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy
Dijana Vukovic
- Aleksandar Kelec, Dijana Vukovic. Privacy threats on Android devices – Big Brother is watching you
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. CryptoCloak Protocol and the Prototype Application
Gaute Wangen
- Gaute Wangen. An Initial Insight Into InfoSec Risk Management Practices
- Gaute Wangen. Conflicting Incentives Risk Analysis: A Case Study of the Normative Peer Review Process
- Gaute Wangen. The role of malware in reported cyber espionage: A review of the impact and mechanism
Goitom Weldehawaryat
- Goitom Weldehawaryat, Stephen Wolthusen. Secure distributed demand projection in micro-grids
- Goitom Weldehawaryat, Stephen Wolthusen. Modelling Interdependencies over Incomplete Join Structures of Power Law Networks
Huihui Yang
- Huihui Yang, Vladimir Oleshchuk. Traceable hierarchical attribute-based authentication for the cloud
- Huihui Yang, Vladimir Oleshchuk. ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
- Huihui Yang, Vladimir Oleshchuk. An efficient traceable attribute-based authentication scheme with one-time attribute trees
- Huihui Yang, Vladimir Oleshchuk. A dynamic attribute-based authentication scheme
Kassaye Yitbarek Yigzaw
- Luis Marco Ruiz, Pablo Pazos, Koray Atalag, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Enabling Clinical Data Reuse with openEHR Data Warehouse Environments
- Meskerem Asfaw Hailemichael, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Emnet: a tool for privacy-preserving statistical computing on distributed health data