Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Henrik Nergaard. Modeling of Work-Based Access Control for Cooperative Healthcare Systems with XACML
  2. Mohamed Ali Saleh Abomhara, Mehdi Ben Lazreg. UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems
  3. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien. Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
  4. Mohamed Ali Saleh Abomhara, Huihui Yang. Collaborative and Secure Sharing of Healthcare Records Using Attribute-Based Authenticated Access
  5. Mohamed Ali Saleh Abomhara, Huihui Yang. Attribute-Based Authenticated Access for Secure Sharing of Healthcare Records in Collaborative Environments
  6. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien. Towards an Access Control Model for Collaborative Healthcare Systems

Bikash Agrawal

  1. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming. Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
  2. Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski. SD-HDFS: Secure Deletion in Hadoop Distributed File System
  3. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming. Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  4. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming. Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning

Vivek Agrawal

  1. Vivek Agrawal. Towards the Ontology of ISO/IEC 27005:2011 Risk Management Standard
  2. Vivek Agrawal. Towards the Ontology of ISO/IEC 27005:2011 Risk Management Standard
  3. Vivek Agrawal. A Comparative Study on Information Security Risk Analysis Methods

Waqas Aman

  1. Waqas Aman. Assessing the Feasibility of Adaptive Security Models for the Internet of Things

Sergii Banin

  1. Sergii Banin, Andrii Shalaginov, Katrin Franke. Memory access patterns for malware detection

Siri Bromander

  1. Siri Bromander, Audun Jøsang, Martin Eian. Semantic cyberthreat modelling

Chris Carr

  1. Britta J. Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
  2. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines. Key Recovery: Inert, Public, Transparent (KRIPT)
  3. Colin Alexander Boyd, Christopher Carr. Fair client puzzles from the Bitcoin blockchain

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Constrained Row-Based Bit-Parallel Search in Intrusion Detection

Samson Yoseph Esayas

  1. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler. Give Me a Sign: Expressing Contract Terms and Data Protection Requirements Visually in Cloud Computing
  2. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler. Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements for Cloud Computing Users
  3. Samson Yoseph Esayas. The Commercialization of Personal Data and its Theoretical and Practical Implications for Data Privacy Law and Competition Law

Stian Fauskanger

  1. Stian Fauskanger, Igor A. Semaev. Statistical and Algebraic Properties of DES

Herman Galteland

  1. Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on cMix – Some Small Overlooked Details

Harsha Sandaruwan Gardiyawasam Pussewalage

  1. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
  2. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. An attribute based access control scheme for secure sharing of electronic health records
  3. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
  4. Harsha Gardiyawasam Pussewalage, Pasika Ranaweera, Vladimir Oleshchuk, Indika A.M. Balapuwaduge. Secure Multi-party based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data

Vasileios Gkioulos

  1. Vasileios Gkioulos, Stephen Wolthusen, Adam Flizikowski, Anna Stachowicz, Dariusz Nogalski, Kamil Gleba, Joanna Sliwa. Interoperability of security and quality of Service Policies Over Tactical SOA
  2. Vasileios Gkioulos, Stephen D. Wolthusen. Securing Tactical Service Oriented Architectures
  3. Vasileios Gkioulos, Stephen Wolthusen, Athanasios Iossifides. A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
  4. Vasileios Gkioulos, Stephen Wolthusen. Efficient security policy reconciliation in tactical service oriented architectures

Håkon Gunleifsen

  1. Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic. An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization

Britta Hale

  1. Britta J. Hale. A Perfect Memory: Key Compromise in an Efficiency-centric World
  2. Britta J. Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
  3. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila. Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
  4. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila. A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
  5. Colin Alexander Boyd, Britta Hale. Secure Channels and Termination: The Last Word on TLS
  6. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  7. Britta Hale. From Key Exchange to Secure Channels: Analysis of Real-World Protocols
  8. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS

Håkon Jacobsen

  1. Christina Brzuska, Håkon Jacobsen, Douglas Stebila. Safely exporting keys from secure channels on the security of EAP-TLS and TLS key exporters

Kjetil Kjernsmo

  1. Kjetil Kjernsmo. Vi må skape sosiale medier for alle
  2. Kjetil Kjernsmo. SPARQL on the Open, Decentralised Web

Siddhartha Kumar

  1. Siddhartha Kumar, Eirik Rosnes, Alexandre Graell i Amat. Secure repairable fountain codes

Guoqiang Li

  1. Guoqiang Li, Bian Yang, Christoph Busch. A Fingerprint Indexing Algorithm on Encrypted Domain

Yi-Ching Liao

  1. Yi-Ching Liao. Process Tracking for Forensic Readiness
  2. Yi-Ching Liao, Hanno Langweg. Evidential Reasoning for Forensic Readiness

Edlira Martiri

  1. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch. Biometric template protection based on Bloom filters and honey templates

Per Håkon Meland

  1. Nils Brede Moe, Per Håkon Meland. Dyrekjøpt utflaggings-erfaring
  2. Nils Brede Moe, Per Håkon Meland. Dyrekjøpt utflaggingserfaring

Soumik Mondal

  1. Soumik Mondal, Patrick Bours. Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification

Christian Otterstad

  1. Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes. Vendor malware: detection limits and mitigation

Pankaj Pandey

  1. Pankaj Pandey, Einar Snekkenes. Using Financial Instruments to Transfer the Information Security Risks

Ashish Rauniyar

  1. Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do. Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm

Patrick Schuch

  1. Patrick Schuch, Simon Schulz, Christoph Busch. De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke. Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps
  2. Sergii Banin, Andrii Shalaginov, Katrin Franke. Memory access patterns for malware detection
  3. Lars Christian Andersen, Katrin Franke, Andrii Shalaginov. Data-driven Approach to Information Sharing using Data Fusion and Machine Learning for Intrusion Detection
  4. Gaute Wangen, Andrii Shalaginov, Christoffer V Hallstensen. Cyber security risk assessment of a DDoS attack
  5. Andrii Shalaginov. Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science
  6. Andrii Shalaginov, Lars Strande Grini, Katrin Franke. Understanding Neuro-Fuzzy on a Class of Multinomial Malware Detection Problems
  7. Andrii Shalaginov, Katrin Franke, Xiongwei Huang. Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
  8. Andrii Shalaginov, Katrin Franke. Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy
  9. Gaute Wangen, Andrii Shalaginov. Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security

Berglind Smaradottir

  1. Berglind Smaradottir. The Steps of User-centered Design in Health Information Technology Development – Recommendations from a PhD Research Study
  2. Berglind Smaradottir. The Steps of User-centered Design in Health Information Technology Development- Recommendations from a PhD Research Study
  3. Berglind Smaradottir, Rune Werner Fensli. User-centred Design of Health Information Technology
  4. Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Torunn Kitty Vatnøy, Rune Werner Fensli. Usability Evaluation of a Collaborative Health Information System- Lessons from a User-centred Design Process
  5. Berglind Smaradottir, Rune Werner Fensli. User-centred Design of Health Information Technology
  6. Atle Christiansen, Berglind Smaradottir. Pasientar utvikla ny helseteneste via nettbrett
  7. Berglind Smaradottir. Pasienter utviklet ny tjeneste via nettbrett
  8. Berglind Smaradottir, Rune Werner Fensli, Vladimir Oleshchuk. User-centred Design and Evaluation of Health Information Technology : Doctoral Dissertation for the Degree Philosophiae Doctor (PhD) in Information and Communication Technology
  9. Berglind Smaradottir, Santiago Martinez, Elisabeth Holen-Rabbersvik, Torunn Kitty Vatnøy, Rune Werner Fensli. Usability Evaluation of a Collaborative Health Information System. Lessons from a User-centred Design Process
  10. Berglind Smaradottir. Brukerinvolvering ved utvikling av ehelse-teknologi Erfaringer fra EU-prosjektet United4Health
  11. Berglind Smaradottir, Martin Gerdes, Santiago Martinez, Rune Werner Fensli. The EU-project United4Health: User-centred design of an information system for a Norwegian telemedicine service

Martin Stokkenes

  1. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch. ‘Authentication protocols for biometric identity on smartphones – An overview’
  2. Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
  3. Martin Stokkenes, Raghavendra R, Morten Sigaard, Kiran Raja, Marta Gomez-Barrero, Christoph Busch. ‘Multi-Biometric Template Protection – A Security Analysis of Binarized Statistical Features for Bloom Filters on Smartphones’

Martin Strand

  1. Anders Smedstuen Lund, Martin Strand. Decryption phase in Norwegian electronic voting

Shukun Tokas

  1. suruchi sinha, Santha Devi, Shukun Tokas, vanita kareer. Quantum cryptanalysis using digital ant in pervasive environment

Gaute Wangen

  1. Gaute Wangen, Andrii Shalaginov, Christoffer V Hallstensen. Cyber security risk assessment of a DDoS attack
  2. Gaute Wangen. An initial insight into Information Security Risk Assessment practices
  3. Gaute Wangen, Andrii Shalaginov. Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch. ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
  2. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch. Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition

Shao-Fang Wen

  1. Shao-Fang Wen. Hyper Contextual Software Security Management for Open Source Software

Huihui Yang

  1. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien. Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
  2. Mohamed Ali Saleh Abomhara, Huihui Yang. Collaborative and Secure Sharing of Healthcare Records Using Attribute-Based Authenticated Access
  3. Huihui Yang, Vladimir Oleshchuk, Andreas Prinz. Verifying group authentication protocols by Scyther
  4. Huihui Yang, Andreas Prinz, Vladimir Oleshchuk. Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
  5. Mohamed Ali Saleh Abomhara, Huihui Yang. Attribute-Based Authenticated Access for Secure Sharing of Healthcare Records in Collaborative Environments

Kassaye Yitbarek Yigzaw

  1. Kassaye Yitbarek Yigzaw, Antonis Michalas, Johan Gustav Bellika. Secure and scalable statistical computation of questionnaire data in R
  2. Andrius Budrionis, Luis Marco-Ruiz, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Building a Learning Healthcare System in North Norway
  3. Luis Marco Ruiz, Andrius Budrionis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Interoperability Mechanisms of Clinical Decision Support Systems: A Systematic Review
  4. Andrius Budrionis, Marco-ruiz Luis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Building a Learning Healthcare System in North Norway
  5. Daniel Karlsson, Andrius Budrionis, Ann Bygholm, Mariann Fossum, Conceicao Granja, Gunnar Hartvigsen, Ole Hejlesen, Maria Hägglund, Monika Alise Johansen, Lars Lindsköld, Santiago Martinez, Carl Erik Moe, Luis Marco Ruiz, Vivian Vimarlund, Kassaye Yitbarek Yigzaw. Proceedings from The 14th Scandinavian Health Informatics Conference 2016