Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid. Towards Risk-aware Access Control Framework for Healthcare Information Sharing
  2. Shada Abdullah AlSalamah, Hessah A. AlSalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Ali Saleh Abomhara, Ibrahim Alyahya. Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study
  3. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  4. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records

Vivek Agrawal

  1. Vivek Agrawal. Information Security Risk Management Practices- Community-Based Knowledge Sharing
  2. Vivek Agrawal, Einar Arthur Snekkenes. Secure Benchmarking using Electronic Voting

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Data Recovery and Security in Cloud
  2. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  3. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  4. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Ramtin Aryan

  1. Ramtin Aryan, Anis Yazidi, Paal E. Engelstad. An Incremental Approach for Swift OpenFlow Anomaly Detection
  2. Ramtin Aryan, Anis Yazidi, Paal E. Engelstad. An Incremental Approach for Swift OpenFlow Anomaly Detection

Sergii Banin

  1. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  2. Sergii Banin, Geir Olav Dyrkolbotn. Multinomial malware classification via low-level features

Chris Carr

  1. Colin Alexander Boyd, Christopher Carr. Valuable Puzzles for Proofs-of-Work

Benjamin Chetioui

  1. Benjamin Chetioui. Production debugging note (SigSegv1 CTF)
  2. Benjamin Chetioui. Tree of life Writeup (Nuit Du Hack 2018)
  3. Benjamin Chetioui. On a pas les bases Writeup (Nuit Du Hack 2018)
  4. Benjamin Chetioui. Very personal portefolio Writeup (Nuit Du Hack 2018)
  5. Benjamin Chetioui. Doors of Durin Writeup (Nuit Du Hack 2018)
  6. Benjamin Chetioui. Fleet Writeup (Nuit Du Hack 2018)
  7. Benjamin Chetioui. ndash Writeup (Nuit Du Hack 2018)
  8. Benjamin Chetioui. icmp Writeup (Nuit Du Hack 2018)
  9. Benjamin Chetioui. Nice Code Writeup (ASIS CTF Quals 2018)
  10. Benjamin Chetioui. Wawacoin Writeup (Nuit du Hack Quals 2018)
  11. Benjamin Chetioui. gmx Writeup (Ångstrom CTF 2018)
  12. Benjamin Chetioui. Paddinganography: hiding data in baseN-encoded strings
  13. Benjamin Chetioui. Souper Strong Primes, Hidden Key and Soupstitution Writeups (EasyCTF IV)
  14. Benjamin Chetioui. Pixelly Writeup (EasyCTF IV)
  15. Benjamin Chetioui. BearShare 1 & 2 Writeup (AceBear Security Contest 2018)
  16. Benjamin Chetioui. Hello fibonacci? Writeup (AceBear Security Contest 2018)
  17. Benjamin Chetioui. VulnShop Writeup (Insomnihack Teaser 2018)

Ambika Chitrakar

  1. Ambika Shrestha Chitrakar, Slobodan Petrovic. Parallel k means clustering with triangle inequality on Spark
  2. Ambika Shrestha Chitrakar, Slobodan Petrovic. Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark
  3. Ambika Shrestha Chitrakar, Slobodan Petrovic. Collecting Network Evidence Using Constrained Approximate Search Algorithms

Peter Davis

  1. Peter Alexander Earls Davis. Biometric Profiling: Privacy, Security and the GDPR

Flávia Dias Casagrande

  1. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Sensor Sequential Data Prediction
  2. Flavia Dias Casagrande, Evi Zouganeli. Occupancy and Daily Activity Event Modelling in Smart Homes for Older Adults with Mild Cognitive Impairment or Dementia
  3. Torhild Holthe, Flavia Dias Casagrande, Liv Halvorsrud, Anne Lund. The assisted living project: a process evaluation of implementation of sensor technology in community assisted living. A feasibility study

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Market Power in ‘Zero’ Price Markets and Competition in (Data) Privacy
  2. Samson Yoseph Esayas, Dan Jerker B. Svantesson. Digital Platforms under Fire – What Australia Can Learn from Recent Developments in Europe
  3. Samson Yoseph Esayas. Privacy as a Non-Price Competition Parameter: Theories of Harm in Mergers
  4. Samson Yoseph Esayas. THE SURVEILLANCE SOCIETY: For Profit Surveillance
  5. Samson Yoseph Esayas. The Commercialization of Personal Data and its Theoretical and Practical Implications for Data Privacy Law and Competition Law
  6. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  7. Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
  8. Samson Yoseph Esayas. The Commercialization of Personal Data and its Implications for Data Privacy Law
  9. Samson Yoseph Esayas. Competition in (data) privacy: ‘zero’-price markets, market power, and the role of competition law
  10. Samson Yoseph Esayas, Angela Daly. The Proposed Australian Consumer Right to Access and Use Data: A European Comparison

Harsha Sandaruwan Gardiyawasam Pussewalage

  1. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Blockchain Based Delegatable Access Control Scheme for a Collaborative E-health Environment

Vasileios Gkioulos

  1. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski. Make it and Break it: An IoT Smart Home Testbed Case Study
  2. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  3. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
  4. Vasileios Gkioulos. Securing Tactical Service Oriented Architectures

Håkon Gunleifsen

  1. Håkon Gunleifsen, Thomas Kemmerich. Security requirements for service function chaining isolation and encryption
  2. Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
  3. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation

Cristina Heghedus

  1. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
  2. Anton Shchipanov, Roman Berenblyum, Alexey A. Khrulenko, Lars Kollbotn, Rong Chunming, Cristina Viorica Heghedus, Fredrik Haugsand. Well Data Analytics: from Case Studies to Solutions
  3. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Informatics Applicability; Machine Learning and Deep Learning
  4. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Load Forecasting Using Deep Learning

Debesh Jha

  1. Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen. The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
  2. Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen. The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
  3. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen. Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract

Yao Jiang

  1. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang. Offline Assisted Group Key Exchange

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Digital Forensics Report for Dagens Næringsliv
  2. Andrii Shalaginov, Katrin Franke, Jan William Johnsen. The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
  3. Jan William Johnsen, Katrin Franke. Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces

Nikolay Kaleyski

  1. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stanica. Partially APN Boolean functions

Nektaria Kaloudi

  1. Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?

Farzane Karami

  1. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani. An Evaluation of Interaction Paradigms for Active Objects
  2. Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen. The Future Mechanism and Information Flow Security

Ali Khodabakhsh

  1. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
  2. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?
  3. Ali Khodabakhsh, Erwin Haasnoot, Patrick Bours. Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics
  4. Erwin Haasnoot, Ali Khodabakhsh, Chris Zeinstra, Luuk Spreeuwers, Raymond N.J. Veldhuis. FEERCI: A Package for Fast Non-Parametric Confidence Intervals for Equal Error Rates in Amortized O(m log n)

Benjamin Knox

  1. Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo. Cognitive Profiles of Female Cyber Defence Operators
  2. Benjamin James Knox. The effect of cyberpower on institutional development in Norway
  3. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
  4. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
  5. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala. Macrocognitive approaches on Cyber Performance
  6. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark. An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  7. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen. Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  8. Benjamin James Knox. A Pathway to Educating Cyberpower in the Norwegian Defence
  9. Benjamin James Knox. Hvorfor koble lederskap med cybermakt…?
  10. Øyvind Jøsok, Benjamin James Knox. Ledelse i cyberdomenet
  11. Kirsi Marjaana Helkala, Benjamin James Knox. Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
  12. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok. Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  13. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin. Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  14. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition

Siddhartha Kumar

  1. Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graelli Amat. An MDS-PIR Capacity-Achieving Protocol for Distributed Storage Using Non-MDS Linear Codes
  2. Siddhartha Kumar, Alexandre Graell i Amat, Iryna Andriyanova, Fredrik Brannstrom, Eirik Rosnes. Code Constructions for Distributed Storage With Low Repair Bandwidth and Low Repair Complexity
  3. Siddhartha Kumar. Privacy, Security, and Repair in Distributed Storage Systems

Vasileios Mavroeidis

  1. Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang. A framework for data-driven physical security and insider threat detection
  2. Vasileios Mavroeidis, Audun Jøsang. Data-Driven Threat Hunting Using Sysmon
  3. Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen. Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
  4. Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang. The impact of quantum computing on present cryptography

Per Håkon Meland

  1. Karin Bernsmed, Per Håkon Meland, Martin Gilje Jaatun. Safety Critical Software and Security – How Low Can You Go?
  2. Harald Stolt-Nielsen, Trond Strøm, Yara Bayoumy, Per Håkon Meland. – Løsepengevirus er blitt en industri på det mørke nettet
  3. Per Håkon Meland, Yara Bayoumy. The Dark Economy of Ransomware
  4. Per Håkon Meland, Ingvald Garbo. Løsepengevirus
  5. Per Håkon Meland. Combining threat models with security economics
  6. Yara Bayoumy, Per Håkon Meland, Guttorm Sindre. A Netnographic Study on the Dark Net Ecosystem for Ransomware
  7. Per Håkon Meland, Fredrik Seehusen. When to Treat Security Risks with Cyber Insurance
  8. Ørnulf Jan Rødseth, Per Håkon Meland, Christian Frøystad, Ovidiu Valentin Drugan. PKI vs. Blockchain when Securing Maritime Operations
  9. Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth. Visualizing cyber security risks with bow-tie diagrams

Kalpanie Mendis

  1. Handunneththi V. Kalpanie Mendis. 5G enabling digitalization of the distribution grid

Maghsoud Morshedi Chinibolagh

  1. Maghsoud Morshedi, Josef Noll, Raheleh Kari. Building Trustable Remote Monitoring and Management Systems
  2. Raheleh Kari, Henrique Murilo Gaspar, Anne Haugen Gausdal, Maghsoud Morshedi. Human Interactions Framework for Remote Ship Operations

Romina Muka

  1. Radek Fujdiak, Petr Mlynek, Sergey Bezzateev, Romina Muka, Jan Slacik, Jiri Misurec, Ondrej Raso. Lightweight structures of big numbers for cryptographic primitives in limited devices

Dmytro Piatkivskyi

  1. Dmytro Piatkivskyi, Mariusz Nowostawski. Split payments in payment networks

Kyle Porter

  1. Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke. Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
  2. Kyle Porter, Slobodan Petrovic. Obtaining precision-recall trade-offs in fuzzy searches of large email corpora
  3. Kyle Porter. Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling
  4. Kyle Porter, Slobodan Petrovic. Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora

Ashish Rauniyar

  1. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMA
  2. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF Energy Harvesting and Information Transmission based on Power Splitting and NOMA for IoT Relay Systems
  3. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF energy harvesting and information transmission based on NOMA for wireless powered IoT relay systems
  4. Ashish Rauniyar, Paal E. Engelstad, Hans Jonas Fossum Moen. A New Distributed Localization Algorithm Using Social Learning Based Particle Swarm Optimization for Internet of Things
  5. Ashish Rauniyar, Soo Young Shin. Cooperative spectrum sensing based on adaptive activation of energy and preamble detector for cognitive radio networks
  6. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Patrick Schuch

  1. Patrick Schuch, Jan Marek May, Christoph Busch. Estimating the Data Origin of Fingerprint Samples
  2. Patrick Schuch, Jan Marek May, Christoph Busch. Unsupervised Learning of Fingerprint Rotations
  3. Patrick Schuch, Jan Marek May, Christoph Busch. Learning Neighbourhoods for Fingerprint Indexing
  4. Patrick Schuch. Survey on features for fingerprint indexing

Felix Schuckert

  1. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg. Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
  2. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg. Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox

Albin Severinson

  1. Lars Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes, Francisco Lázaro, Gianluigi Liva. A Droplet Approach Based on Raptor Codes for Distributed Computing with Straggling Servers
  2. Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes. Block-diagonal coding for distributed computing with straggling servers

Andrii Shalaginov

  1. Andrii Shalaginov, Katrin Franke, Jan William Johnsen. The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
  2. Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke. Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
  3. Asif Iqbal, Andrii Shalaginov, Farhan Mahmood. Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks
  4. Asif Iqbal, Farhan Mahmood, Andrii Shalaginov, Mathias Ekstedt. Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
  5. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  6. Andrii Shalaginov. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Large-scale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic

Kashif Habib Sheikh

  1. Kashif Habib, Wolfgang Leister, Einar Arthur Snekkenes, Ilangko Balasingham. Context-Aware Adaptive Authentication for the IoT in eHealth

Manish Shrestha

  1. Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

Martin Stokkenes

  1. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch. Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
  2. Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch. Baseline Evaluation of Smartphone based Finger-photo Verification System
  3. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch. Biometric Transaction Authentication using Smartphones
  4. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch. Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures

Bo Sun

  1. Bo Sun, Sigurd Skogestad, Junguo Lu, Weidong Zhang. Dual SIMC-PI Controller Design for Cascade Implement of Input Resetting Control with Application
  2. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun. On Upper Bounds for Algebraic Degrees of APN Functions
  3. Bo Sun, Lilya Budaghyan. On Classification and Some Properties of APN Functions

Jayachander Surbiryala

  1. Jayachander Surbiryala, Rong Chunming. Data Recovery and Security in Cloud
  2. Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
  3. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  4. Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools

Adam Szekeres

  1. Adam Szekeres, Einar Arthur Snekkenes. Unobtrusive Psychological Profiling for Risk Analysis

Shukun Tokas

  1. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-Based Support for GDPR-Related Privacy Requirements
  2. Shukun Tokas, Toktam Ramezanifarkhani. Language-Based Support for GDPR-Related Privacy Requirements
  3. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas. A secrecy-preserving language for distributed and object-oriented systems

Irene Villa

  1. Irene Villa. On APN functions L1(x3) + L2(x9) with linear L1 and L2

Kamer Vishi

  1. Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang. A framework for data-driven physical security and insider threat detection
  2. Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen. Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
  3. Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang. The impact of quantum computing on present cryptography

Pankaj Wasnik

  1. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch. Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
  2. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch. Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
  3. Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch. Baseline Evaluation of Smartphone based Finger-photo Verification System
  4. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch. Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
  5. Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja. Assessing Face Image Quality with LSTMs
  6. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?
  7. Jag Mohan Singh, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra. Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU

Shao-Fang Wen

  1. Shao-Fang Wen, Basel Katt. An Ontology-Based Context Model for Managing Security Knowledge in Software Development
  2. Shao-Fang Wen. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities
  3. Shao-Fang Wen. Software Security Knowledge Transferring and Learning with Concept Maps
  4. Shao-Fang Wen. Learning Secure Programming in Open Source Software Communities: A Socio-Technical View

Muhammad Mudassar Yamin

  1. Muhammad Mudassar Yamin, Basel Katt. Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
  2. Muhammad Mudassar Yamin, Basel Katt. Detecting Malicious Windows Commands Using Natural Language Processing Techniques
  3. Muhammad Mudassar Yamin, Basel Katt. Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges
  4. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski. Make it and Break it: An IoT Smart Home Testbed Case Study

Tetiana Yarygina

  1. Tetiana Yarygina, Christian W. Otterstad. A Game of Microservices: Automated Intrusion Response
  2. Tetiana Yarygina, Anya Helene Bagge. Overcoming Security Challenges in Microservice Architectures
  3. Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi. Exploring Microservice Security

Jin Zhang

  1. Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?

Xiaojie Zhu

  1. Ping Shen, Chi Chen, Xiaojie Zhu. Privacy-preserving relevance ranking scheme and its application in multi-keyword searchable encryption