Below you can see the research output generated by Ph.D. student members of COINS.
Jayachander Surbiryala
- Yuri Demchenko, Zhiming Zhao, Jayachander Surbiryala, Spiros Koulouzis, Zeshun Shi, Xiaofeng Liao, Jelena Gordiyenko. Teaching DevOps and Cloud Based Software Engineering in University Curricula
- Jayachander Surbiryala, Rong Chunming. Cloud Computing: History and Overview
- Zeshun Shi, Huan Zhou, Jayachander Surbiryala, Yang Hu, Cees de Laat, Zhiming Zhao. An Automated Customization and Performance Profiling Framework for Permissioned Blockchains in a Virtualized Environment
- Zeshun Shi, Huan Zhou, Yang Hu, Jayachander Surbiryala, Cees de Laat, Zhiming Zhao. Operating Permissioned Blockchain in Clouds: A Performance Study of Hyperledger Sawtooth
- Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala. Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers
Ramtin Aryan
- Ramtin Aryan, Frode Henriksen Brattensborg, Anis Yazidi, Paal Engelstad. Checking the OpenFlow Rule Installation and Operational Verification
- Ramtin Aryan, Frode Brattensborg, Anis Yazidi, Paal E. Engelstad. Checking the OpenFlow Rule Installation and Operational Verification
Sergii Banin
- Sergii Banin, Geir Olav Dyrkolbotn. Correlating High- and Low-Level Features: Increased Understanding of Malware Classification
Benjamin Chetioui
- Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià. Finite difference methods fengshui: alignment through a mathematics of arrays
- Benjamin Chetioui. RCE through URI protocol handlers on mIRC <7.55 (CVE-2019-6453)
- Benjamin Chetioui. CVE-2019-6453: RCE on mIRC <7.55 using argument injection through custom URI protocol handlers
- Benjamin Chetioui. Bitshift Writeup (Sogeti Cyber E-Scape 2019 Qualifier)
- Benjamin Chetioui. Drinks Writeup (Insomnihack Teaser 2019)
Ambika Chitrakar
- Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke. Identifying Anomalous HTTP Traffic with Association Rule Mining
- Ambika Shrestha Chitrakar, Slobodan Petrovic. Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics
Peter Davis
- Peter Alexander Earls Davis. Assistance and Access Act (Australia): the Latest Government Attempt to Resist “Going Dark”
- Peter Alexander Earls Davis, Luca Tosoni. EU cybersecurity act, NIS directive, experience with GDPR after one year
Flávia Dias Casagrande
- Flavia Dias Casagrande, Evi Zouganeli. Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande. Sensor Event and Activity Prediction using Binary Sensors in Real Homes with Older Adults
- Flavia Dias Casagrande, Evi Zouganeli. Activity Recognition and Prediction in Real Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults
- Evi Zouganeli, Flavia Dias Casagrande. Hvordan kan kunstig intelligens støtte eldre til å leve et selvstendig liv hjemme og hva har Assisted Living prosjektet bidratt med.
- Flavia Dias Casagrande, Oda Olsen Nedrejord, Wonho Lee, Evi Zouganeli. Action Recognition in Real Homes using Low Resolution Depth Video Data
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults
Samson Yoseph Esayas
- Samson Yoseph Esayas. Privacy-As-A-Quality Parameter of Competition
- Samson Yoseph Esayas. Data Privacy in European Merger Control: Critical Analysis of Commission Decisions Regarding Privacy as a Non-Price Competition
Ali Esmaeily
- Mohsen Bagheri, Maryam Dehghani, Ali Esmaeily, Vahid Akbari. Assessment of land subsidence using interferometric synthetic aperture radar time series analysis and artificial neural network in a geospatial information system: Case study of Rafsanjan Plain
Harsha Sandaruwan Gardiyawasam Pussewalage
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
- Harsha Gardiyawasam Pussewalage. Attribute Based Cryptographic Enforcements for Security and Privacy in E-health Environments
Befekadu Gebraselase
- Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang. Suitability of Blockchains to Enable and Support Networking Functions: State of Art
Navid Ghaedi Bardeh
- Navid Ghaedi Bardeh, Sondre Rønjom. The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts
- Navid Ghaedi Bardeh, Sondre Rønjom. Practical attacks on reduced-round AES
Håkon Gunleifsen
- Håkon Gunleifsen. Security in Interconnected Network Function Virtualisation Environments
- Håkon Gunleifsen, Vasileios Gkioulos, Gaute Wangen, Andrii Shalaginov, Mazaher Kianpour, Mohamed Ali Saleh Abomhara. Cybersecurity Awareness and Culture in Rural Norway
- Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos. A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
- Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos. Dynamic setup of IPsec VPNs in service function chaining
- Håkon Gunleifsen. Cyber security awareness and culture in rural Norway
Cristina Heghedus
- Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong. Neural Network Frameworks. Comparison on Public Transportation Prediction
- Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong. Neural Network Architectures for Electricity Consumption Forecasting
- Cristina Viorica Heghedus, Anton Shchipanov, Rong Chunming. Advancing Deep Learning to Improve Upstream Petroleum Monitoring
- Cristina Viorica Heghedus, Anton Shchipanov, Chunming Rong. Pattern Recognition and Flow Rate Reconstruction: PDG Data Analysis Using Machine Learning
Debesh Jha
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen. ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen. ResUNet++: An Advanced Architecture for Medical Image Segmentation
Jan William Johnsen
- Jan William Johnsen, Katrin Franke. The impact of preprocessing in natural language for open source intelligence and criminal investigation
Nikolay Kaleyski
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stănică. Partially APN Boolean functions and classes of functions that are not APN infinitely often
- Nikolay Stoyanov Kaleyski. Changing APN functions at two points
Farzane Karami
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani. Summary of: An Evaluation of Interaction Paradigms for Active Objects
Ali Khodabakhsh
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
- Ali Khodabakhsh, Marius Pedersen, Christoph Busch. Subjective Versus Objective Face Image Quality Evaluation For Face Recognition
Benjamin Knox
- Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin. Cyber Defense Officer Profiles and Performance factors
- Stefan Sütterlin, Benjamin James Knox, Ricardo Gregorio Lugo. TalTechi küberkaitseteadlased: ainult tehnilistest oskustest ja teadmistest küberkaitses ei piisa
- Benjamin James Knox, Ricardo Gregorio Lugo, Stefan Sütterlin. Cognisance as a human factor in military cyber defence education
- Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala. Self-regulation and cognitive agility in cyber operations
- Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin. Cognitive Profiles and Education of Female Cyber Defence Operators
- Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin. Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower
Vasileios Mavroeidis
- Alexander Egiazarov, Vasileios Mavroeidis, Kamer Vishi, Fabio Massimo Zennaro. Firearm Detection and Segmentation using an Ensemble of Semantic Neural Networks
Per Håkon Meland
- Bent Johansen, Guttorm Sindre, Per Håkon Meland. You Don’t Know CryptoJack
- Per Håkon Meland, Bent Johansen. You Don’t Know CryptoJack
- Thor Myklebust, Per Håkon Meland, Tor Stålhane, Geir Kjetil Hanssen. The Agile RAMSS lifecycle for the future
- Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre. An experimental analysis of cryptojacking attacks
- Per Håkon Meland. Resilient Cyber Security Through Cybercrime Market Analysis
- Ulrik Franke, Per Håkon Meland. Demand side expectations of cyber insurance
- Matthieu Branlat, Per Håkon Meland, Tor Erik Evjemo, Anthony Smoker. Connectivity and resilience of remote operations: insights from Air Traffic Management
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. An experimental evaluation of bow-tie analysis for security
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. An experimental evaluation of bow-tie analysis for cybersecurity requirements
- Ørnulf Jan Rødseth, Per Håkon Meland, Christian Frøystad, Ovidiu Valentin Drugan. PKI vs. Blockchain when Securing Maritime Operations
Kalpanie Mendis
- Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska. 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
- Handunneththi V. Kalpanie Mendis, Indika A.M. Balapuwaduge, Frank Yong Li. Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain
Maghsoud Morshedi Chinibolagh
- Maghsoud Morshedi, Josef Noll. Deploying Energy Efficient Wi-Fi Networks
Romina Muka
- Romina Muka. Flere “øyne” på nettet
- Romina Muka, Fredrik Bakkevig Haugli, Hanne Vefsnmo, Poul Einar Heegaard. Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks
Livinus Obiora Nweke
- Livinus Obiora Nweke, Stephen Wolthusen, Luigi V. Mancini. A Framework for the Validation of Network Artifacts
Ashish Rauniyar
- Ramesh Pokhrel, Ashish Rauniyar, Anis Yazidi. In the Quest of Trade-off between Job Parallelism and Throughput in Hadoop: A Stochastic Learning Approach for Parameter Tuning on the Fly
- Ashish Rauniyar, Jeevan Kunwar, Hårek Haugerud, Anis Yazidi, Paal E. Engelstad. Energy Efficient Target Coverage in Wireless Sensor Networks Using Adaptive Learning
- Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Performance Analysis of RF Energy Harvesting and Information Transmission based on NOMA with Interfering Signal for IoT Relay Systems
Parisa Rezaee Borj
- Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours. Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
- Parisa Rezaee Borj, Patrick Bours. Predatory Conversation Detection
- Parisa Rezaee Borj, Patrick Bours. Detecting Liars in Chats using Keystroke Dynamics
- Parisa Rezaee Borj, Kiran Bylappa Raja, Patrick Bours. On Preprocessing the Data for Improving Sexual Predator Detection
- Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours. Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
- Parisa Rezaee Borj, Patrick Bours. Detecting Liars in Chats using Keystroke Dynamics
Albin Severinson
- Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes. Block-Diagonal and LT Codes for Distributed Computing with Straggling Servers
Manish Shrestha
- Manish Shrestha, Christian Johansen, Josef Noll. Criteria for Security Classification of Smart Home Energy Management Systems (long version)
Åvald Åslaugson Sommervoll
- Dag Einar Sommervoll, Åvald Åslaugson Sommervoll. Learning from Man and Machine: Spatial Fixed Effects in Urban Econometrics
- Dag Einar Sommervoll, Åvald Åslaugson Sommervoll. Learning from Man or machine: Spatial fixed effects in urban econometrics
- Åvald Åslaugson Sommervoll, Dag Einar Sommervoll. Learning from man or machine: Spatial fixed effects in urban econometrics
Jayachander Surbiryala
- Yuri Demchenko, Zhiming Zhao, Jayachander Surbiryala, Spiros Koulouzis, Zeshun Shi, Xiaofeng Liao, Jelena Gordiyenko. Teaching DevOps and Cloud Based Software Engineering in University Curricula
- Jayachander Surbiryala, Rong Chunming. Cloud Computing: History and Overview
- Zeshun Shi, Huan Zhou, Jayachander Surbiryala, Yang Hu, Cees de Laat, Zhiming Zhao. An Automated Customization and Performance Profiling Framework for Permissioned Blockchains in a Virtualized Environment
- Zeshun Shi, Huan Zhou, Yang Hu, Jayachander Surbiryala, Cees de Laat, Zhiming Zhao. Operating Permissioned Blockchain in Clouds: A Performance Study of Hyperledger Sawtooth
- Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala. Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers
Adam Szekeres
- Adam Szekeres, Einar Arthur Snekkenes. A Taxonomy of Situations within the Context of Risk Analysis
- Adam Szekeres, Einar Arthur Snekkenes. Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
- Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation
Andrea Tenti
- Alessandro Budroni, Andrea Tenti. The mersenne low hamming combination search problem can be reduced to an ILP problem
Shukun Tokas
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-Based Mechanisms for Privacy by Design
- Shukun Tokas, Olaf Owe. A Formal Framework for Consent Management
Srimathi Varadharajan
- Mithilesh Kumar, Håvard Raddum, Srimathi Varadharajan. Reducing lattice enumeration search trees
Irene Villa
- Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa. On Isotopic Shift Construction for Planar Functions
- Lilya Budaghyan, Marco Calderini, Irene Villa. On relations between CCZ- and EA-equivalences
Kamer Vishi
- Alexander Egiazarov, Vasileios Mavroeidis, Kamer Vishi, Fabio Massimo Zennaro. Firearm Detection and Segmentation using an Ensemble of Semantic Neural Networks
Pankaj Wasnik
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch. An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch. Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
- Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation
Shao-Fang Wen
- Shao-Fang Wen, Mazaher Kianpour, Stewart James Kowalski. An Empirical Study of Security Culture in Open Source Software Communities
- Shao-Fang Wen, Basel Katt. Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
- Shao-Fang Wen, Basel Katt. Managing Software Security Knowledge in Context: An Ontology Based Approach
- Shao-Fang Wen, Basel Katt. Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
- Shao-Fang Wen, Basel Katt. Towards a Context-Based Approach for Software Security Learning
- Shao-Fang Wen, Basel Katt. Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach
- Shao-Fang Wen, Mazaher Kianpour, Basel Katt. Security Knowledge Management in Open Source Software Communities
Shuang Wu
- Shuang Wu, Øyvind Mikkelsen, Shazia Nusrat Aslam. Soil-water influences on trace elements and organic matter in Arctic
Muhammad Mudassar Yamin
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
- Muhammad Mudassar Yamin, Basel Katt. Cyber Security Skill Set Analysis for Common Curricula Development
- Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour. Cyber Weapons Storage Mechanisms
- Grethe Østby, Muhammad Mudassar Yamin, Bilal AlSabbagh. SIEMS in crisis management: Detection, escalation and presentation – a work in progress
- Muhammad Mudassar Yamin, Basel Katt. Modeling Attack and Defense Scenarios for Cyber Security Exercises
- Muhammad Mudassar Yamin, Basel Katt. Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
- Muhammad Mudassar Yamin, Basel Katt, Kashif Sattar, Maaz Bin Ahmad. Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos. Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
- Muhammad Mudassar Yamin, Basel Katt. A Survey of Automated Information Exchange Mechanisms Among CERTs
- Muhammad Mudassar Yamin, Basel Katt. Mobile device management (MDM) technologies, issues and challenges
Prosper Yeng
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Observational measures for effective profiling of healthcare staffs? security practices
- Prosper Yeng, Peter Nimbe, Benjamin Asubam Weyori, Terje Solvoll, Bian Yang. Web Vulnerability Measures for SMEs
- Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen. K-CUSUM: Cluster Detection Mechanism in EDMON
- Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen. K-CUSUM: Cluster Detection Mechanism in EDMON
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes. Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
- Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Ali Saleh Abomhara, Prosper Yeng, Javed Ahmed. Data-driven Intrusion Detection System for Small and Medium Enterprises
Xiaojie Zhu
- Xiaojie Zhu, Ayday Erman, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud
- Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A privacy-preserving framework for outsourcing location-based services to the cloud
Grethe Østby
- Grethe Østby, Basel Katt. Cyber Crisis Management Roles – A Municipality Responsibility Case Study
- Grethe Østby, Muhammad Mudassar Yamin, Bilal AlSabbagh. SIEMS in crisis management: Detection, escalation and presentation – a work in progress
- Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski. A Socio-Technical Framework to Improve cyber security training: A Work in Progress