- Finn Arve Aagesen
- Stefan Axelsson
- Kerstin Bach
- Patrick Bours
- Colin Boyd
- Edmund Førland Brekke
- Christoph Busch
- Geir Olav Dyrkolbotn
- Katrin Franke
- Laura Georg
- Kristian Gjøsteen
- Vasileios Gkioulos
- Danilo Gligoroski
- Bjørn Axel Gran
- Poul Heegaard
- Bjarne Helvik
- Rune Hjelsvold
- Morten Hovd
- Bernhard Hämmerli
- Nils Kalstad
- Sokratis Katsikas
- Basel Katt
- Thomas Kemmerich
- Vlado Kitanovski
- Stewart Kowalski
- Frank Alexander Kraemer
- Katina Kralevska
- Øivind Kure
- Hanno Langweg
- Jingyue Li
- Mary Ann Lundteigen
- Stig Frode Mjølsnes
- Khalid Mughal
- Mariusz Nowostawski
- Runar Ostnes
- Jiaxin Pan
- Marius Pedersen
- Slobodan Petrovic
- Raghavendra Ramachandra
- Guttorm Sindre
- Einar Snekkenes
- Norvald Stol
- John Tyssedal
- Thomas Walmann
- Hao Wang
- Otto Jonassen Wittner
- Stephen Wolthusen
- Bian Yang
- Sule Yildirim-Yayilgan
- Harald Øverby
- Lilya Budaghyan
- Magne Haveraaen
- Tor Helleseth
- Kjell Hole
- Jaakko Järvi
- Oleksandr Kholosha
- Nian Li
- Federico Mancini
- Matthew Geoffrey Parker
- Håvard Raddum
- Eirik Rosnes
- Sondre Rønjom
- Igor A. Semaev
- Øyvind Ytrehus
- Lee Andrew Bygrave
- Frank Eliassen
- Paal Engelstad
- Martin Giese
- Thomas Gregersen
- Nils Gruschka
- Pål Halvorsen
- Christian Johansen
- Audun Jøsang
- Tobias Mahler
- Josef Noll
- Nils Agne Nordbotten
- Olaf Owe
- Toktam Ramezanifarkhani
- Martin Steffen
- Amir Taherkordi
- Jim Tørresen
- Roman Vitenberg
- Arild Waaler
- Yan Zhang
- Peter Ölveczky
- Inger Berg Ørstavik
- Anders Andersen
- Johan Gustav Bellika
- Gro Berntsen
- Fred Godtliebsen
- Gunnar Hartvigsen
- Håvard D. Johansen
- Dag Johansen
- Trygve Johnsen
- Hugues Verdure
- Habtamu Abie
- Martin Eian
- Boning Feng
- Lothar Fritsch
- Zeno Geradts
- Alexandre Graell i Amat
- Janne Merete Hagen
- Hallstein Hansen
- Kirsi Helkala
- Hans-Arno Jacobsen
- Stig Ole Johnsen
- Arjan Kuiper
- Helger Lipmaa
- G.P. (Jeanne) Mifsud Bonnici
- Leon Moonen
- Leif Nilsen
- Christian Rathgeb
- Bernd-Christian Renner
- Michael Riegler
- Davide Roverso
- Stein Olav Skrøvseth
- Martijn Stam
- Stefan Sütterlin
- Do Van Thanh
- Stephen Westland
- Evi Zouganeli
- Andrè Årnes
Norwegian University of Science and Technology
Students supervised:
- Marija Gajic, 2017-2022: ‘Policy – based network applications and service configuration’
Students supervised:
- Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
- Gunnar Alendal, 2016-2020: ‘Security vulnerability research for use in digital forensic acquisition’
- Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
- Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’
Students supervised:
- Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’
Students supervised:
- Soumik Mondal, 2012-2016: ‘Continuous Authentication using Behavioural Biometrics’
- Guoqiang Li, 2012-2016: ‘Biometric indexing’
- Parisa Rezaee Borj, 2017-2021: ‘Chat room security’
Publications co-authored with COINS students:
- Patrick Bours, Soumik Mondal (2013). Continuous Authentication using Behavioural Biometrics
- Soumik Mondal, Patrick Bours (2013). Continuous Authentication using Mouse Dynamics
- Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus (2013). Complexity measurement of a password for keystroke dynamics: preliminary study
- Soumik Mondal, Patrick Bours (2014). Continuous Authentication using Fuzzy Logic
- John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia (2015). One-handed Keystroke Biometric Identification Competition
- Patrick Bours, Soumik Mondal (2015). Continuous Authentication with Keystroke Dynamics
- Patrick Bours, Soumik Mondal (2015). Performance evaluation of continuous authentication systems
- Soumik Mondal, Patrick Bours (2015). A Computational Approach to the Continuous Authentication Biometric System
- Soumik Mondal, Patrick Bours (2015). Context independent continuous authentication using behavioural biometrics
- Soumik Mondal, Patrick Bours (2015). Continuous Authentication in a Real World Settings
- Soumik Mondal, Patrick Bours (2015). Continuous authentication and identification for mobile devices: Combining security and forensics
- Soumik Mondal, Patrick Bours (2015). Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device
- Soumik Mondal, Patrick Bours (2015). Swipe Gesture based Continuous Authentication for Mobile Devices
- Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours (2015). Keystroke Dynamics Performance Enhancement With Soft Biometrics
- Soumik Mondal, Patrick Bours (2016). Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification
- Ctirad Sousedik, Ralph Breithaupt, Patrick Bours (2017). Classification of Fingerprints Captured Using Optical Coherence Tomography
- Ali Khodabakhsh, Erwin Haasnoot, Patrick Bours (2018). Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics
- Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours (2019). Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
- Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours (2019). Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
- Parisa Rezaee Borj, Patrick Bours (2019). Detecting Liars in Chats using Keystroke Dynamics
- Parisa Rezaee Borj, Patrick Bours (2019). Detecting Liars in Chats using Keystroke Dynamics
- Parisa Rezaee Borj, Patrick Bours (2019). Predatory Conversation Detection
- Parisa Rezaee Borj, Kiran Bylappa Raja, Patrick Bours (2019). On Preprocessing the Data for Improving Sexual Predator Detection
- Muhammad Ali Fauzi, Patrick Bours (2020). Ensemble Method for Sexual Predators Identification in Online Chats
- Parisa Rezaee Borj, Kiran Raja, Patrick Bours (2021). Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles
Students supervised:
- Britta Hale, 2014-2017: ‘Modelling and Analysis of Real-World Cryptographic Authentication and Key-Exchange Protocols’
- Chris Carr, 2014-2019: ‘Protection in Complex Cyber Systems’
- Enio Marku, 2017-2021: ‘Securing emerging network technologies with homomorphic encryption’
- Bor de Kock, 2018-2022: ‘Post-Quantum Key Exchanges’
- Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
- Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
- Morten Solberg, 2019-2023: ‘Secure, Usable and Robust Cryptographic Voting Systems’
- Sonu Jha, 2019-2023: ‘Lightweight Cryptography for Future Smart Networks’
- Lise Millerjord, 2019-2024: ‘Lightweight Cryptography for Future Smart Networks’
Publications co-authored with COINS students:
- Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
- Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
- Colin Alexander Boyd, Britta Hale (2016). Secure Channels and Termination: The Last Word on TLS
- Colin Alexander Boyd, Christopher Carr (2016). Fair client puzzles from the Bitcoin blockchain
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
- Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines (2016). Key Recovery: Inert, Public, Transparent (KRIPT)
- Colin Alexander Boyd, Britta Hale (2017). Secure Channels and Termination: The Last Word on TLS
- Colin Alexander Boyd, Christopher Carr, Xavier Boyen, Thomas Haines (2017). Bitcoin Unchained
- Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines (2017). Key recovery: Inert and public
- Colin Alexander Boyd, Christopher Carr (2018). Valuable Puzzles for Proofs-of-Work
- Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2018). Offline Assisted Group Key Exchange
- Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2020). Fast and Secure Updatable Encryption
- shuang wu, Kristian Gjøsteen, Colin Alexander Boyd (2020). A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
- Colin Alexander Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord (2021). Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Students supervised:
- Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’
Students supervised:
- Martin Aastrup Olsen, 2011-2015: ‘Fingerprint Image Quaity (employer: CASED)’
- Anika Pflug, 2011-2015: ‘2D and 3D Ear Recognition (employer: CASED)’
- Ctirad Sousedik, 2012-2018: ‘Fake Resistant Fingerprint Biometrics’
- Guoqiang Li, 2012-2016: ‘Biometric indexing’
- Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
- Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’
- Patrick Schuch, 2015-2019: ‘Representation Learning for Fingerprint Recognition (employer: Dermalog)’
- Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
- Pawel Drozdowski, 2016-2020: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’
- Ali Khodabakhsh, 2017-2021: ‘Automated Authentication of Audiovisual Contents: A Biometric Approach’
- Hareesh Mandalapu, 2017-2020: ‘Presentation Attack Detection in Iris and Ocular biometrics’
- Muhammad Ali Fauzi, 2019-2022: ‘Modelling Healthcare Staffs’ Mental State to Minimize Cybersecurity Risk’
Publications co-authored with COINS students:
- Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
- Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
- Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
- Ctirad Sousedik, Ralph Breithaupt, Christoph Busch (2013). Volumetric Fingerprint Data Analysis using Optical Coherence Tomography
- Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
- Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
- Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
- Martin Aastrup Olsen, Elham Tabassi, Anton Makarov, Christoph Busch (2013). Self-Organizing Maps for Fingerprint Image Quality Assessment
- Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
- Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
- Ctirad Sousedik, Christoph Busch (2014). Presentation attack detection methods for fingerprint recognition systems: a survey
- Ctirad Sousedik, Christoph Busch (2014). Quality of Fingerprint Scans captured using Optical Coherence Tomography
- Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
- Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
- Ivan Danov, Martin Aastrup Olsen, Christoph Busch (2014). Interpretation of fingerprint image quality features extracted by self-organizing maps
- Jinghua Wang, Martin Aastrup Olsen, Christoph Busch (2014). Finger image quality based on singular point localization
- John Ellingsgård, Ctirad Sousedik, Christoph Busch (2014). Detecting fingerprint alterations by orientation field and minutiae orientation analysis
- Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
- Marek Dusio, Martin Aastrup Olsen, Christoph Busch (2014). Fingerprint sample quality assessment via ridge line count using Laplacian of Gaussian edge finding
- Niclas Overgaard, Ctirad Sousedik, Christoph Busch (2014). Eulerian Video Magnification for Fingerprint Liveness Detection
- Carsten Gottschlich, Anna Mikaelyan, Martin Aastrup Olsen, Josef Bigun, Christoph Busch (2015). Improving Fingerprint Alteration Detection
- Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
- Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
- Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
- Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
- Martin Aastrup Olsen, Marek Dusio, Christoph Busch (2015). Fingerprint skin moisture impact on biometric performance
- Martin Aastrup Olsen, Martin Böckeler, Christoph Busch (2015). Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments
- Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
- Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain
- Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
- Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
- Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
- Patrick Schuch, Simon Schulz, Christoph Busch (2016). De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
- Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch (2017). Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch (2017). Feature Level Fused Templates for Multi-Biometric System on Smartphones
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
- Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja (2017). Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
- Patrick Schuch, Simon Schulz, Christoph Busch (2017). De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
- Patrick Schuch, Simon Schulz, Christoph Busch (2017). Deep Expectation for Estimation of Fingerprint Orientation Fields
- Patrick Schuch, Simon Schulz, Christoph Busch (2017). Minutia-based Enhancement of Fingerprint Samples
- Patrick Schuch, Simon Schulz, Christoph Busch (2017). Minutia-based Enhancement of Fingerprint Samples
- Patrick Schuch, Simon Schulz, Christoph Busch (2017). Survey on the impact of fingerprint image enhancement
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). ConvNet Regression for Fingerprint Orientations
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Deep Expectation for Estimation of Fingerprint Orientation Fields
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Intrinsic Limitations of Fingerprint Orientation Estimation
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Intrinsic Limitations of Fingerprint Orientation Estimation
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2018). A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
- Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch (2018). Fake Face Detection Methods: Can They Be Generalized?
- Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2018). Biometric Transaction Authentication using Smartphones
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2018). Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch (2018). Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
- Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch (2018). Baseline Evaluation of Smartphone based Finger-photo Verification System
- Patrick Schuch, Jan Marek May, Christoph Busch (2018). Estimating the Data Origin of Fingerprint Samples
- Patrick Schuch, Jan Marek May, Christoph Busch (2018). Learning Neighbourhoods for Fingerprint Indexing
- Patrick Schuch, Jan Marek May, Christoph Busch (2018). Unsupervised Learning of Fingerprint Rotations
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch (2018). Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
- Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja (2018). Assessing Face Image Quality with LSTMs
- Ali Khodabakhsh, Marius Pedersen, Christoph Busch (2019). Subjective Versus Objective Face Image Quality Evaluation For Face Recognition
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2019). Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2019). An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch (2019). Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
- Ali Khodabakhsh, Christoph Busch (2020). A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
- Thomas Nielsen, Ali Khodabakhsh, Christoph Busch (2020). Unit-Selection Based Facial Video Manipulation Detection
- Ali Khodabakhsh, Christoph Busch, Raghavendra Ramachandra (2021). Automated Authentication of Audiovisual Contents: A Biometric Approach
Students supervised:
- Sergii Banin, 2016-2019: ‘Advanced Machine Learning Techniques in Malware Analysis Applications’
Publications co-authored with COINS students:
- Sergii Banin, Geir Olav Dyrkolbotn (2018). Multinomial malware classification via low-level features
- Sergii Banin, Geir Olav Dyrkolbotn (2019). Correlating High- and Low-Level Features: Increased Understanding of Malware Classification
Students supervised:
- Andrii Shalaginov, 2013-2018: ‘Application of soft computing for information security’
- Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
- Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
- Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
- Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
- Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
- Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’
- Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’
- Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’
- Radina Stoykova, 2017-2020: ‘Standards for digital evidence’
Publications co-authored with COINS students:
- Andrii Shalaginov, Katrin Franke (2013). Automatic rule-mining for malware detection employing Neuro-Fuzzy Approach
- Andrii Shalaginov, Katrin Franke (2015). A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications
- Andrii Shalaginov, Katrin Franke (2015). A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
- Andrii Shalaginov, Katrin Franke (2015). Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations
- Andrii Shalaginov, Katrin Franke (2015). Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy
- Andrii Shalaginov, Katrin Franke (2015). Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications
- Andrii Shalaginov, Katrin Franke (2016). Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps
- Andrii Shalaginov, Katrin Franke (2016). Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy
- Andrii Shalaginov, Katrin Franke, Xiongwei Huang (2016). Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
- Andrii Shalaginov, Lars Strande Grini, Katrin Franke (2016). Understanding Neuro-Fuzzy on a Class of Multinomial Malware Detection Problems
- Lars Christian Andersen, Katrin Franke, Andrii Shalaginov (2016). Data-driven Approach to Information Sharing using Data Fusion and Machine Learning for Intrusion Detection
- Sergii Banin, Andrii Shalaginov, Katrin Franke (2016). Memory access patterns for malware detection
- Andrii Shalaginov, Katrin Franke (2017). A Deep Neuro-Fuzzy method for multi-label malware classification and fuzzy rules extraction
- Andrii Shalaginov, Katrin Franke (2017). Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
- Andrii Shalaginov, Jan William Johnsen, Katrin Franke (2017). Cyber Crime Investigations in the Era of Big Data
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen (2017). IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
- Jan William Johnsen, Katrin Franke (2017). Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen (2018). The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
- Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke (2018). Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
- Jan William Johnsen, Katrin Franke (2018). Digital Forensics Report for Dagens Næringsliv
- Jan William Johnsen, Katrin Franke (2018). Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
- Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke (2018). Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
- Jan William Johnsen, Katrin Franke (2019). The impact of preprocessing in natural language for open source intelligence and criminal investigation
- Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke (2019). Identifying Anomalous HTTP Traffic with Association Rule Mining
- Jan William Johnsen, Katrin Franke (2020). Identifying Proficient Cybercriminals Through Text and Network Analysis
- Rune Nordvik, Kyle Porter, Fergus Toolan, Stefan Axelsson, Katrin Franke (2020). Generic Metadata Time Carving
Students supervised:
- Adam Szekeres, 2016-2020: ‘Human motivation and the security of Internet of Things’
Students supervised:
- Chris Carr, 2014-2019: ‘Protection in Complex Cyber Systems’
- Martin Strand, 2013-2017: ‘Fully homomorphic encryption’
- Herman Galteland, 2015-2020: ‘On the usage of cryptography in malware’
- Yao Jiang, 2016-2021: ‘Cryptographic Tools for Cloud Security’
- Tjerand Silde, 2018-2023: ‘Post Quantum Cryptography’
- Bor de Kock, 2018-2022: ‘Post-Quantum Key Exchanges’
- Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
- Shuang Wu, 2018-2022: ‘Trust and Transparency in Digital Society Through Blockchain Technology’
- Morten Solberg, 2019-2023: ‘Secure, Usable and Robust Cryptographic Voting Systems’
- Lise Millerjord, 2019-2024: ‘Lightweight Cryptography for Future Smart Networks’
- Kelsey Moran, 2019-2023: ‘Future Proofing Cryptographic Voting Systems’
Publications co-authored with COINS students:
- Herman Galteland, Kristian Gjøsteen (2016). Malware, Encryption, and Rerandomization – Everything is Under Attack
- Herman Galteland, Kristian Gjøsteen (2017). Malware, Encryption, and Rerandomization – Everything is Under Attack
- Kristian Gjøsteen, Martin Strand (2017). A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
- Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2018). Offline Assisted Group Key Exchange
- Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2020). Fast and Secure Updatable Encryption
- Gareth Thomas Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang (2020). Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
- shuang wu, Kristian Gjøsteen, Colin Alexander Boyd (2020). A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
- Bor de Kock, Kristian Gjøsteen, Mattia Veroni (2021). Practical Isogeny-Based Key-Exchange with Optimal Tightness
- Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge (2021). Lattice-Based Proof of Shuffle and Applications to Electronic Voting
- Kristian Gjøsteen, Thomas Edmund Haines, Morten Rotvold Solberg (2021). Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme
Students supervised:
- Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’
Students supervised:
- Håkon Jacobsen, 2012-2017: ‘Constructing Efficient Multivariate and Code-based Public-Key Algorithm’
- Dijana Vukovic, 2013-2017: ‘Increasing the performance, robustness, reliability and security of web services’
- Simona Samardjiska, 2010-2015: ‘Multivariate Public Key Algorithms Produced by Quasigroups’
- Maria Bartnes, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’
- Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
- Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
- Ali Esmaeily, 2018-2022: ‘Network Slicing in 5G’
Publications co-authored with COINS students:
- Simona Samardjiska, Smile Markovski, Danilo Gligoroski (2010). Multivariate Quasigroups Defined by T-functions
- Smile Markovski, Simona Samardjiska, Danilo Gligoroski, Svein Johan Knapskog (2010). Multivariate Trapdoor Functions Based on Multivariate Left Quasigroups and Left Polynomial Quasigroups
- Danilo Gligoroski, Simona Samardjiska (2011). The Public Key Encryption Scheme MQQ-ENC
- Danilo Gligoroski, Svein Johan Knapskog, Simona Samardjiska (2011). The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies
- Simona Samardjiska, Danilo Gligoroski (2011). Identity-Based Identification Schemes Using Left Multivariate Quasigroups
- Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
- Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
- Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2011). Construction of Multivariate Quadratic Quasigroups (MQQs) in Arbitrary Galois Fields
- Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
- Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
- Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2012). On the strong and weak keys in MQQ-SIG
- Simona Samardjiska, Danilo Gligoroski (2012). Left MQQs whose left parastrophe is also quadratic
- Simona Samardjiska, Danilo Gligoroski (2012). Towards a Secure Multivariate Identity-Based Encryption
- Simona Samardjiska, Danilo Gligoroski (2012). Towards a secure Multivariate Identity-Based Encryption
- Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2012). Algorithms for construction of multivariate quadratic quasigroups (MQQs) and their parastrophe operations in arbitrary Galois fields
- Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
- Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
- Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2013). On the strong and weak keys in MQQ-SIG
- Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation Polynomials Over F_(2^n)
- Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation and Quasigroup Polynomials Over Finite Fields of Characteristic 2
- Simona Samardjiska, Danilo Gligoroski (2013). Towards a Characterization of Left Quasigroup Polynomials of Small Degree Over Fields of Characteristic 2
- Simona Samardjiska, Danilo Gligoroski (2013). Towards a secure Multivariate Identity-Based Encryption
- Danilo Gligoroski, Simona Samardjiska (2014). iSHAKE: Incremental Hashing With SHAKE128 and SHAKE256 for the Zettabyte Era
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy (2014). CAESAR candidate PiCipher
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly (2014). Pi-Cipher: Authenticated Encryption for Big Data
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). Improvement Proposal for the CryptoCloak Application
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). On Privacy Protection in the Internet Surveillance Era
- Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak – Improvement Proposal Implementation
- Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak application – main idea, an overview and improvement proposal
- Simona Samardjiska, Danilo Gligoroski (2014). Linearity Measures for Multivariate Public Key Cryptography
- Britta Hale, Christopher Alan Carr, Danilo Gligoroski (2015). CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2015). CryptoCloak Protocol and the Prototype Application
- Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae (2015). A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
- Simona Samardjiska, Danilo Gligoroski (2015). Approaching maximum embedding efficiency on small covers using Staircase-Generator codes
- Britta J. Hale, Christopher Carr, Danilo Gligoroski (2016). CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
- Britta Hale, Christopher Carr, Danilo Gligoroski (2017). CARIBE: Cascaded IBE for maximum flexibility and user-side control
- Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G
- Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
Students supervised:
- Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’
Publications co-authored with COINS students:
- Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions
Students supervised:
- Maria Bartnes, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’
- Romina Muka, 2018-2021: ‘Application of New Sensors and Controllers for Distribution Grid Operation’
- Kalpanie Mendis, 2018-2022: ‘Developing a low-latency, secure and dependable communication architecture for Microgrid protection and Control’
Publications co-authored with COINS students:
- Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska (2019). 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
- Romina Muka, Fredrik Bakkevig Haugli, Hanne Vefsnmo, Poul Einar Heegaard (2019). Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks
- Marija Gajic, Marija Furdek, Poul Einar Heegaard (2020). A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery
- Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Vicente Casares-Giner, Frank Yong Li, Katina Kralevska (2021). Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
- Kashif Mehmood, Handunneththi V. Kalpanie Mendis, Katina Kralevska, Poul Einar Heegaard (2021). Intent-based Network Management and Orchestration for Smart Distribution Grids
- Michele Garau, Romina Muka, Poul Einar Heegaard, Bjarne Emil Helvik (2021). Co-simulation and Discrete Event Simulation for Reliability Assessment of Power System and ICT: A Comparison
- Romina Muka, Michele Garau, Poul Einar Heegaard (2021). Genetic algorithm for placement of IEDs for fault location in smart distribution grids
- Romina Muka, Michele Garau, Besmir Tola, Poul Einar Heegaard (2021). Effect of 5G communication service failure on placement of Intelligent Electronic Devices in Smart Distribution Grids
Students supervised:
- Befekadu Gebraselase, 2018-2022: ‘Networking impact and support for blockchains’
Publications co-authored with COINS students:
- Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2019). Suitability of Blockchains to Enable and Support Networking Functions: State of Art
- Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). An Analysis of Transaction Handling in Bitcoin
- Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). Effect of Miner Incentive on the Confirmation Time of Bitcoin Transactions
- Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). Transaction Characteristics of Bitcoin
- Michele Garau, Romina Muka, Poul Einar Heegaard, Bjarne Emil Helvik (2021). Co-simulation and Discrete Event Simulation for Reliability Assessment of Power System and ICT: A Comparison
Students supervised:
- Shao-Fang Wen, 2015-2020: ‘Hyper Contextual Information Security Management’
Students supervised:
- Romina Muka, 2018-2021: ‘Application of New Sensors and Controllers for Distribution Grid Operation’
Students supervised:
- Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’
Students supervised:
- Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’
Students supervised:
- Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’
- Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’
- Ahmed Amro, 2018-2022: ‘Communication and Cybersecurity for autonomous passenger ferry’
- Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’
- Aida Akbarzadeh, 2019-2022: ‘Cyber-physical security of power plants within the smart grid’
- Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’
- Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’
- Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’
Publications co-authored with COINS students:
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas (2017). User Modeling Validation Over the Security Awareness of Digital Natives
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou (2017). Security Awareness of the Digital Natives
- Ahmed Walid Amro, Vasileios Gkioulos, Sokratis Katsikas (2020). Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation
- Aida Akbarzadeh, Sokratis Katsikas (2020). Identifying Critical Components in Large Scale Cyber Physical Systems
- Aida Akbarzadeh, Pankaj Pandey, Sokratis Katsikas (2020). Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
- Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions
- Ahmed Walid Amro, Vasileios Gkioulos, Sokratis Katsikas (2021). Communication architecture for autonomous passenger ship
- Aida Akbarzadeh, Sokratis Katsikas (2021). Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems
- Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas (2022). Navigation Data Anomaly Analysis and Detection
- Aida Akbarzadeh, Sokratis Katsikas (2022). Unified IT&OT Modeling for Cybersecurity Analysis of Cyber-Physical Systems
- Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas (2022). Towards a Cyber-Physical Range for the Integrated Navigation System
Students supervised:
- Felix Schuckert, 2016-2020: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’
- Muhammad Mudassar Yamin, 2018-2022: ‘Modelling and Analyzing Attack-Defence Scenarios for Cyber Ranges’
- Grethe Østby, 2019-2023: ‘Societal safety in transformation – digitalization and information security awareness in civil society and civil emergency’
Publications co-authored with COINS students:
- Felix Schuckert, Basel Katt, Hanno Langweg (2017). Source Code Patterns of SQL Injection Vulnerabilities
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
- Muhammad Mudassar Yamin, Basel Katt (2018). Detecting Malicious Windows Commands Using Natural Language Processing Techniques
- Muhammad Mudassar Yamin, Basel Katt (2018). Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
- Muhammad Mudassar Yamin, Basel Katt (2018). Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski (2018). Make it and Break it: An IoT Smart Home Testbed Case Study
- Shao-Fang Wen, Basel Katt (2018). An Ontology-Based Context Model for Managing Security Knowledge in Software Development
- Grethe Østby, Basel Katt (2019). Cyber Crisis Management Roles – A Municipality Responsibility Case Study
- Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski (2019). A Socio-Technical Framework to Improve cyber security training: A Work in Progress
- Muhammad Mudassar Yamin, Basel Katt (2019). A Survey of Automated Information Exchange Mechanisms Among CERTs
- Muhammad Mudassar Yamin, Basel Katt (2019). Cyber Security Skill Set Analysis for Common Curricula Development
- Muhammad Mudassar Yamin, Basel Katt (2019). Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
- Muhammad Mudassar Yamin, Basel Katt (2019). Mobile device management (MDM) technologies, issues and challenges
- Muhammad Mudassar Yamin, Basel Katt (2019). Modeling Attack and Defense Scenarios for Cyber Security Exercises
- Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour (2019). Cyber Weapons Storage Mechanisms
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos (2019). Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos (2019). Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
- Muhammad Mudassar Yamin, Basel Katt, Kashif Sattar, Maaz Bin Ahmad (2019). Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
- Shao-Fang Wen, Basel Katt (2019). Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach
- Shao-Fang Wen, Basel Katt (2019). Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
- Shao-Fang Wen, Basel Katt (2019). Managing Software Security Knowledge in Context: An Ontology Based Approach
- Shao-Fang Wen, Basel Katt (2019). Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
- Shao-Fang Wen, Basel Katt (2019). Towards a Context-Based Approach for Software Security Learning
- Shao-Fang Wen, Mazaher Kianpour, Basel Katt (2019). Security Knowledge Management in Open Source Software Communities
- Ankur Shukla, Basel Katt, Livinus Obiora Nweke (2020). Vulnerability Discovery Modelling With Vulnerability Severity
- Felix Schuckert, Basel Katt, Hanno Langweg (2020). Difficult XSS Code Patterns for Static Code Analysis Tools
- Grethe Østby, Basel Katt (2020). Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
- Grethe Østby, Kieren N. Lovell, Basel Katt (2020). EXCON Teams in Cyber Security Training
- Grethe Østby, Stewart James Kowalski, Basel Katt (2020). Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
- Mats Seljeseth, Muhammad Mudassar Yamin, Basel Katt (2020). UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices
- Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt (2020). Smart Policing for a Smart World Opportunities, Challenges and Way Forward
- Muhammad Mudassar Yamin, Basel Katt, Espen Torseth (2021). Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study
- Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski (2021). Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises
- Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt (2021). Weaponized AI for cyber attacks
- Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt (2021). Ontology-Based Scenario Modeling for Cyber Security Exercise
- Muhammad Mudassar Yamin, Basel Katt (2022). Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges
- Muhammad Mudassar Yamin, Espen Torseth, Laszlo Erdodi, Basel Katt (2022). Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
- Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt, Mohammad Hijji, Khan Muhammad (2022). Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Students supervised:
- Håkon Gunleifsen, 2015-2020: ‘A communication model of distributed Network Controllers in a virtualized environment (employer: Eidsiva bredbånd)’
Publications co-authored with COINS students:
- Thomas Kemmerich, Vivek Agrawal, Carsten Momsen (2015). Secure migration to the cloud—In and out
- Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization
- Håkon Gunleifsen, Thomas Kemmerich (2018). Security requirements for service function chaining isolation and encryption
- Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich (2018). A Tiered Control Plane Model for Service Function Chaining Isolation
- Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos (2019). A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
- Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos (2019). Dynamic setup of IPsec VPNs in service function chaining
Students supervised:
- Altynay Kadyrova, 2019-2022: ‘Quality Assessment for Material Appearance’
Students supervised:
- Shao-Fang Wen, 2015-2020: ‘Hyper Contextual Information Security Management’
- Mazaher Kianpour, 2018-2022: ‘Information Security Economics’
- Grethe Østby, 2019-2023: ‘Societal safety in transformation – digitalization and information security awareness in civil society and civil emergency’
Publications co-authored with COINS students:
- Shao-Fang Wen, Stewart James Kowalski (2017). A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski (2018). Make it and Break it: An IoT Smart Home Testbed Case Study
- Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski (2019). A Socio-Technical Framework to Improve cyber security training: A Work in Progress
- Shao-Fang Wen, Mazaher Kianpour, Stewart James Kowalski (2019). An Empirical Study of Security Culture in Open Source Software Communities
- Grethe Østby, Stewart James Kowalski (2020). Preparing for cyber crisis management exercises
- Grethe Østby, Stewart James Kowalski, Basel Katt (2020). Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
- Grethe Østby, Stewart James Kowalski (2021). A case study of a municipality phishing attack measures – towards a socio-technical incident management framework
- Grethe Østby, Stewart James Kowalski (2022). Introducing Serious Games as a Master Course in Information Security Management Programs: Moving Towards Socio-Technical Incident Response Learning
Students supervised:
- Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’
Publications co-authored with COINS students:
- Stanislav Lange, Susanna Schwarzmann, Marija Gajic, Thomas Zinner, Frank Alexander Kraemer (2021). AI in 5G Networks: Challenges and Use Cases
Students supervised:
- Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
- Ali Esmaeily, 2018-2022: ‘Network Slicing in 5G’
Publications co-authored with COINS students:
- Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska (2019). 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
- Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G
- Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
- Ali Esmaeily, Katina Kralevska (2021). Small-Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review
- Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Vicente Casares-Giner, Frank Yong Li, Katina Kralevska (2021). Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
- Kashif Mehmood, Handunneththi V. Kalpanie Mendis, Katina Kralevska, Poul Einar Heegaard (2021). Intent-based Network Management and Orchestration for Smart Distribution Grids
Students supervised:
- Desta Haileselassie Hagos, 2015-2020: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’
Students supervised:
- Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
- Felix Schuckert, 2016-2020: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’
Publications co-authored with COINS students:
- Hanno Langweg, Lisa Rajbhandari (2012). Flexible Regulation with Privacy Points
- Yi-Ching Liao, Hanno Langweg (2013). A Survey of Process Activity Tracking Systems
- Rune Nordvik, Yi-Ching Liao, Hanno Langweg (2014). AccountabilityFS: A File System Monitor for Forensic Readiness
- Yi-Ching Liao, Hanno Langweg (2014). Cost-benefit analysis of kernel tracing systems for forensic readiness
- Yi-Ching Liao, Hanno Langweg (2014). Process Tracking for Forensic Readiness
- Yi-Ching Liao, Hanno Langweg (2014). Resource-Based Event Reconstruction of Digital Crime Scenes
- Yi-Ching Liao, Hanno Langweg (2015). Developing Metrics for Surveillance Impact Assessment
- Yi-Ching Liao, Hanno Langweg (2015). Events and causal factors charting of kernel traces for root cause analysis
- Yi-Ching Liao, Hanno Langweg (2016). Evidential Reasoning for Forensic Readiness
- Felix Schuckert, Basel Katt, Hanno Langweg (2017). Source Code Patterns of SQL Injection Vulnerabilities
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
- Felix Schuckert, Basel Katt, Hanno Langweg (2020). Difficult XSS Code Patterns for Static Code Analysis Tools
Students supervised:
- Eivind Kristoffersen, 2017-2021: ‘CIRCit (employer: Sopra Steria)’
- Jin Zhang, 2017-2021: ‘Integrated safety and security analysis of cyber-physical systems using system engineering approach’
- Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’
Publications co-authored with COINS students:
- Jingyue Li, Jin Zhang, Nektaria Kaloudi (2018). Could We Issue Driving Licenses to Autonomous Vehicles?
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for cybersecurity requirements
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for security
- Jin Zhang, Jingyue Li (2020). Testing and verification of neural-network-based safety-critical control software: A systematic literature review
- Nektaria Kaloudi, Jingyue Li (2020). The AI-based cyber threat landscape: A survey
- J. Robert Taylor, Jin Zhang, Igor Kozine, Jingyue Li (2021). Safety and Security Analysis for Autonomous Vehicles
- Jin Zhang, J. Robert Taylor, Igor Kozine, Jingyue Li (2021). Analyzing Influence of Robustness of Neural Networks on the Safety of Autonomous Vehicles
- Jin Zhang, Taylor J.Robert, Kozine Igor, Jingyue Li (2021). Analyzing Influence of Robustness of Neural Networks on the Safety of AutonomousVehicles
- Nektaria Kaloudi, Jingyue Li (2021). Comparison of Risk Analysis Approaches for Analyzing Emergent Misbehavior in Autonomous Systems
- Torstein Meyer, Nektaria Kaloudi, Jingyue Li (2021). A Systematic Literature Review on Malicious Use of Reinforcement Learning
Students supervised:
- Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’
Publications co-authored with COINS students:
- Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions
Students supervised:
- Sonu Jha, 2019-2023: ‘Lightweight Cryptography for Future Smart Networks’
Publications co-authored with COINS students:
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
- Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
- Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid (2016). Attacks on cMix – Some Small Overlooked Details
- Charlotte S. Rikardsen, Britta Hale, Stig Frode Mjølsnes (2017). User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps
- Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid (2017). Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
Students supervised:
- Samson Gejibo, 2011-2015: ‘Security Aspects of Mobile Health system’
Publications co-authored with COINS students:
- Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Jørn Ivar Klungsøyr (2011). Adding Security to Mobile Data Collection
- Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Java ME-Based Mobile Data Collection Systems
- Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Mobile Data Collection Systems
- Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Mobile Data Collection Systems for Low-Budget Settings
- Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
- Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
- Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Daniele Grasso (2013). Secure cloud storage for remote mobile data collection
- Samson Hussien Gejibo, Khalid Azim Mughal (2015). Towards a Secure Framework for mHealth. A Case Study in Mobile Data Collection Systems
Students supervised:
- Abylay Satybaldy, 2019-2022: ‘Rights and Identity on Blockchains, Trust and Transparency in Digital Society Through Blockchain Technology’
Publications co-authored with COINS students:
- Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski (2017). Digital forensic implications of collusion attacks on the lightning network
- Dmytro Piatkivskyi, Mariusz Nowostawski (2018). Split payments in payment networks
- Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski (2021). Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises
Students supervised:
- Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’
Students supervised:
- Magnus Ringerud, 2019-2023: ‘Formal treatment of practical signature schemes’
Students supervised:
- Altynay Kadyrova, 2019-2022: ‘Quality Assessment for Material Appearance’
Publications co-authored with COINS students:
- Ali Khodabakhsh, Marius Pedersen, Christoph Busch (2019). Subjective Versus Objective Face Image Quality Evaluation For Face Recognition
Students supervised:
- Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
- Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’
- Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’
- Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’
Publications co-authored with COINS students:
- Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2015). Approximate search with constraints on indels with application in SPAM filtering
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2016). Constrained Row-Based Bit-Parallel Search in Intrusion Detection
- Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2017). CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns
- Kyle Porter, Slobodan Petrovic (2017). On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
- Kyle Porter, Slobodan Petrovic (2017). On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Collecting Network Evidence Using Constrained Approximate Search Algorithms
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Parallel k means clustering with triangle inequality on Spark
- Kyle Porter, Slobodan Petrovic (2018). Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora
- Kyle Porter, Slobodan Petrovic (2018). Obtaining precision-recall trade-offs in fuzzy searches of large email corpora
- Ambika Shrestha Chitrakar, Slobodan Petrovic (2019). Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics
Students supervised:
- Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
- Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
- Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’
- Hareesh Mandalapu, 2017-2020: ‘Presentation Attack Detection in Iris and Ocular biometrics’
- Jag Mohan Singh, 2018-2021: ‘Robust Biometric Authentication using 3D Information’
Publications co-authored with COINS students:
- Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
- Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
- Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
- Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
- Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
- Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
- Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
- Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch (2017). Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch (2017). Feature Level Fused Templates for Multi-Biometric System on Smartphones
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
- Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja (2017). Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2018). A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
- Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch (2018). Fake Face Detection Methods: Can They Be Generalized?
- Jag Mohan Singh, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra (2018). Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU
- Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2018). Biometric Transaction Authentication using Smartphones
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2018). Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch (2018). Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
- Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch (2018). Baseline Evaluation of Smartphone based Finger-photo Verification System
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch (2018). Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
- Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja (2018). Assessing Face Image Quality with LSTMs
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2019). Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2019). An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch (2019). Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
- Ali Khodabakhsh, Christoph Busch, Raghavendra Ramachandra (2021). Automated Authentication of Audiovisual Contents: A Biometric Approach
Students supervised:
- Per Håkon Meland, 2016-2020: ‘Modelling of cyber attacks and economic incentives (employer: SINTEF)’
Publications co-authored with COINS students:
- Yara Bayoumy, Per Håkon Meland, Guttorm Sindre (2018). A Netnographic Study on the Dark Net Ecosystem for Ransomware
- Bent Johansen, Guttorm Sindre, Per Håkon Meland (2019). You Don’t Know CryptoJack
- Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre (2019). An experimental analysis of cryptojacking attacks
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for cybersecurity requirements
- Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for security
- Kristian Haga, Per Håkon Meland, Guttorm Sindre (2020). Breaking the Cyber Kill Chain by Modelling Resource Costs
- Per Håkon Meland, Guttorm Sindre (2020). Cyber Attacks for Sale
- Per Håkon Meland, Yara Bayoumy, Guttorm Sindre (2020). The Ransomware-as-a-Service economy within the darknet
Students supervised:
- Lisa Rajbhandari, 2010-2013: ‘Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk’
- Kashif Habib Sheikh, 2012-2018: ‘Risk-based adaptive security for internet of things in eHealth (employer: NR)’
- Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’
- Pankaj Pandey, 2012-2016: ‘Using Theories from Economics and Finance to Address Information Security Risk Management’
- Waqas Aman, 2012-2016: ‘Context Aware Risk Analysis for Adaptive Security in Internet of Things’
- Gaute Wangen, 2013-2017: ‘Conflicting Incentives Risk Analysis’
- Vivek Agrawal, 2014-2018: ‘Cloud Based Conflicting Incentives risk analysis’
- Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
- Adam Szekeres, 2016-2020: ‘Human motivation and the security of Internet of Things’
Publications co-authored with COINS students:
- Lisa Rajbhandari, Einar Snekkenes (2011). An Approach to Measure Effectiveness of Control for Risk Analysis with Game Theory
- Lisa Rajbhandari, Einar Snekkenes (2011). Mapping between Classical Risk Management and Game Theoretical Approaches
- Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
- Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
- Lisa Rajbhandari, Einar Snekkenes (2012). Intended Actions: Risk Is Conflicting Incentives
- Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems
- Gaute Wangen, Einar Snekkenes (2013). A Taxonomy of Challenges in Information Security Risk Management
- Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Research and Training
- Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Risk Analysis Research and Training
- Lisa Rajbhandari, Einar Snekkenes (2013). Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
- Lisa Rajbhandari, Einar Snekkenes (2013). Using the Conflicting Incentives Risk Analysis Method
- Pankaj Pandey, Einar Snekkenes (2013). A Framework for Comparison and Analysis of Information Security Investment Models
- Waqas Aman, Einar Snekkenes (2013). An Empirical Research on InfoSec Risk Management in IoT-based eHealth
- Gaute Wangen, Einar Snekkenes (2014). A Comparison between Business Process Management and Information Security Management
- Pankaj Pandey, Einar Snekkenes (2014). An Assessment of Market Methods for Information Security Risk Management
- Pankaj Pandey, Einar Snekkenes (2014). Applicability of Prediction Markets in Information Security Risk Management
- Pankaj Pandey, Einar Snekkenes (2014). Using Prediction Markets to Hedge Information Security Risks
- Pankaj Pandey, Einar Snekkenes (2014). Using prediction markets to hedge information security risks
- Waqas Aman, Einar Snekkenes (2014). Event Driven Adaptive Security in Internet of Things
- Pankaj Pandey, Einar Snekkenes (2015). A Performance Assessment Metric for Information Security Financial Instruments
- Pankaj Pandey, Einar Snekkenes (2015). Design and Performance Aspects of Information Security Prediction Markets for Risk Management
- Waqas Aman, Einar Snekkenes (2015). EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
- Waqas Aman, Einar Snekkenes (2015). Managing Security Trade-offs in the Internet of Things using Adaptive Security
- Pankaj Pandey, Einar Snekkenes (2016). Using Financial Instruments to Transfer the Information Security Risks
- Vivek Agrawal, Einar Arthur Snekkenes (2017). An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
- Vivek Agrawal, Einar Arthur Snekkenes (2017). An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
- Vivek Agrawal, Einar Arthur Snekkenes (2017). Creating a successful Communities of practice
- Vivek Agrawal, Einar Arthur Snekkenes (2017). Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
- Vivek Agrawal, Einar Arthur Snekkenes (2017). Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
- Vivek Agrawal, Einar Arthur Snekkenes (2017). UnRizkNow: A community of practice for information security risk practitioners
- Vivek Agrawal, Einar Arthur Snekkenes (2017). UnRizkNow: An open electronic community of practice for information security professionals
- Vivek Agrawal, Einar Arthur Snekkenes (2017). Utfordringer og muligheter for deling av informasjon innen Cyber Security
- Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes (2017). Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
- Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes (2017). Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
- Adam Szekeres, Einar Arthur Snekkenes (2018). Unobtrusive Psychological Profiling for Risk Analysis
- Kashif Habib, Wolfgang Leister, Einar Arthur Snekkenes, Ilangko Balasingham (2018). Context-Aware Adaptive Authentication for the IoT in eHealth
- Vivek Agrawal, Einar Arthur Snekkenes (2018). Secure Benchmarking using Electronic Voting
- Adam Szekeres, Einar Arthur Snekkenes (2019). A Taxonomy of Situations within the Context of Risk Analysis
- Adam Szekeres, Einar Arthur Snekkenes (2019). Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
- Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes (2019). Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational measures for effective profiling of healthcare staffs? security practices
- Adam Szekeres, Einar Arthur Snekkenes (2020). Construction of Human Motivational Profiles by Observation for Risk Analysis
- Adam Szekeres, Einar Arthur Snekkenes (2020). Representing decision-makers in SGAM-H: the Smart Grid Architecture Model Extended with the Human Layer
- Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes (2020). Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
- Prosper Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study
- Prosper Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes (2021). Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
Students supervised:
- Ali Esmaeily, 2018-2022: ‘Network Slicing in 5G’
Students supervised:
- Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’
Publications co-authored with COINS students:
- Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation
- Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation
Students supervised:
- Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
Students supervised:
- Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’
Students supervised:
- Marija Gajic, 2017-2022: ‘Policy – based network applications and service configuration’
Students supervised:
- Goitom Weldehawaryat, 2011-2017: ‘Resilient Consensus, Interdependencies, and Optimisation in Sparse Networks’
- Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’
- Livinus Obiora Nweke, 2019-2022: ‘Understanding the Resilience of Software Defined Networking for Industrial Control Networks’
Publications co-authored with COINS students:
- Goitom Weldehawaryat, Stephen Wolthusen (2013). Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs
- Goitom Weldehawaryat, Stephen Wolthusen (2014). Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence
- Goitom Weldehawaryat, Stephen Wolthusen (2015). Modelling Interdependencies over Incomplete Join Structures of Power Law Networks
- Goitom Weldehawaryat, Stephen Wolthusen (2015). Secure distributed demand projection in micro-grids
- Vasileios Gkioulos, Stephen Wolthusen (2015). Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks
- Vasileios Gkioulos, Stephen Wolthusen (2016). Efficient security policy reconciliation in tactical service oriented architectures
- Vasileios Gkioulos, Stephen D. Wolthusen (2016). Securing Tactical Service Oriented Architectures
- Vasileios Gkioulos, Stephen Wolthusen, Athanasios Iossifides (2016). A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
- Vasileios Gkioulos, Stephen Wolthusen, Adam Flizikowski, Anna Stachowicz, Dariusz Nogalski, Kamil Gleba, Joanna Sliwa (2016). Interoperability of security and quality of Service Policies Over Tactical SOA
- Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem (2017). Decentralised scheduling of power consumption in micro-grids: Optimisation and security
- Vasileios Gkioulos, Stephen Wolthusen (2017). A Security Policy Infrastructure for Tactical Service Oriented Architectures
- Vasileios Gkioulos, Stephen Wolthusen (2017). Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
- Vasileios Gkioulos, Stephen Wolthusen (2017). Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
- Vasileios Gkioulos, Stephen Wolthusen (2017). Security Requirements for the Deployment of Services Across Tactical SOA
- Vasileios Gkioulos, Erko Risthein, Stephen Wolthusen (2017). TACTICS: Validation of the security framework developed for tactical SOA
- Livinus Obiora Nweke, Stephen Wolthusen, Luigi V. Mancini (2019). A Framework for the Validation of Network Artifacts
- Livinus Obiora Nweke, Stephen Wolthusen (2020). A Review of Asset-Centric Threat Modelling Approaches
- Livinus Obiora Nweke, Stephen Wolthusen (2020). Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
- Livinus Obiora Nweke, Stephen Wolthusen (2020). Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
- Livinus Obiora Nweke, Stephen Wolthusen (2020). Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
- Livinus Obiora Nweke, Stephen Wolthusen (2020). Resilience Analysis of Software-Defined Networks Using Queueing Networks
- Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Wolthusen (2020). Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
- Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang (2020). Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Legal requirements toward enhancing the security of medical devices
- Livinus Obiora Nweke, Stephen Wolthusen (2021). A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda
- Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen (2021). Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2021). Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring
- Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen (2022). Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466))
Students supervised:
- Edlira Martiri, 2012-2020: ‘Template protection for multi-biometrics (employer: University of Tirana)’
- Guoqiang Li, 2012-2016: ‘Biometric indexing’
- Prosper Yeng, 2019-2022: ‘Healthcare Security Practice Analysis, Modeling and Incentivization’
- Muhammad Ali Fauzi, 2019-2022: ‘Modelling Healthcare Staffs’ Mental State to Minimize Cybersecurity Risk’
Publications co-authored with COINS students:
- Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
- Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
- Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
- Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
- Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
- Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
- Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
- Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
- Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
- Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
- Bian Yang, Edlira Nepravishta Martiri (2015). Using Honey Templates to Augment Hash Based Biometric Template Protection
- Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
- Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
- Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
- Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
- Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
- Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
- Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational measures for effective profiling of healthcare staffs? security practices
- Prosper Yeng, Peter Nimbe, Benjamin Asubam Weyori, Terje Solvoll, Bian Yang (2019). Web Vulnerability Measures for SMEs
- Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang (2020). Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
- Muhammad Ali Fauzi, Bian Yang (2020). Audiouth: Multi-factor Authentication Based on Audio Signal
- Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN Based Honeywords System for Machine-Generated Passwords Database
- Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies
- Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN-Based Honeywords System
- Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness
- Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2020). Comparative analysis of machine learning methods for analyzing security practice in electronic health records’ logs.
- Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2020). Workflow-based anomaly detection using machine learning on electronic health records’ logs: A Comparative Study
- Prosper Yeng, Stephen D. Wolthusen, Bian Yang (2020). Comparative analysis of software development methodologies for security requirement analysis: Towards healthcare security practice
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Legal requirements toward enhancing the security of medical devices
- Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes (2020). Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
- Muhammad Ali Fauzi, Bian Yang (2021). Continuous Stress Detection of Hospital Staff Using Smartwatch Sensors and Classifier Ensemble
- Muhammad Ali Fauzi, Prosper Yeng, Bian Yang, Dita Rachmayani (2021). Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia
- Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2021). Assessing the effect of human factors in healthcare cyber security practice: An empirical study
- Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2021). Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring
- Prosper Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study
- Prosper Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes (2021). Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study
Students supervised:
- Doney Abraham, 2020-2023: ‘Cybersecurity of IoT enabled Smart Grids’
- Sarang Shaikh, 2021-2024: ‘PhD candidate in modelling and simulation of social impact and acceptability of modern border control technologies’
Publications co-authored with COINS students:
- Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Ali Saleh Abomhara, Prosper Yeng, Javed Ahmed (2019). Data-driven Intrusion Detection System for Small and Medium Enterprises
- Mohamed Abomhara, Sule Yildirim Yayilgan, Livinus Obiora Nweke, Zoltán Székely (2021). A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders
- Doney Abraham, Sule Yildirim Yayilgan, Mohamed Abomhara, Alemayehu Gebremedhin, Fisnik Dalipi (2022). Security and Privacy issues in IoT based Smart Grids: A case study in a digital substation
- Filip Holik, Doney Abraham, Sule Yildirim Yayilgan (2022). Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations
- Livinus Obiora Nweke, Mohamed Abomhara, Sule Yildirim Yayilgan, Debora Camparin, Olivier Heurtier, Calum Bunney (2022). A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
- Sule Yildirim Yayilgan, Filip Holik, Mohamed Abomhara, Doney Abraham, Alemayehu Gebremedhin (2022). A Comprehensive Methodology for Analyzing Cyber Security Threats and Attacks in IoT based Power Networks: A Case Study of Digital Substation in Norway (PUBLICATION IS UNDER REVIEW)
Students supervised:
- Mazaher Kianpour, 2018-2022: ‘Information Security Economics’
University of Agder
Students supervised:
- Mohamed Abomhara, 2013-2018: ‘Security and Privacy in Context’
Publications co-authored with COINS students:
- Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
- Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2014). Security and Privacy in the Internet of Things: Current Status and Open Issues
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
- Mohamed Ali Saleh Abomhara, Martin Gerdes, Geir Myrdahl Køien (2015). A STRIDE-Based Threat Model for Telehealth Systems
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2016). Towards an Access Control Model for Collaborative Healthcare Systems
- Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien (2016). Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
- Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg (2017). Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification
- Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes (2018). Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
- Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes (2018). Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid (2018). Towards Risk-aware Access Control Framework for Healthcare Information Sharing
Students supervised:
- Nils Ulltveit-Moe, 2009-2014: ‘Privacy Enhanced Network Monitoring’
- Huihui Yang, 2012-2016: ‘Privacy Policies for Online Services’
- Berglind Smaradottir, 2010-2016: ‘Usability evaluation and security management of health care information systems’
- Joseph Twayigira, 2013-2017: ‘Using Mobile Cloud Computing for Crisis and Emergency Management: Securty and Privacy Aspects (employer: University of Rwanda)’
- Harsha Sandaruwan Gardiyawasam Pussewalage, 2015-2019: ‘Attribute based Methods to Enforce Security and Privacy in E-health Solutions’
Publications co-authored with COINS students:
- Vladimir Oleshchuk, Nils Ulltveit-Moe (2009). Two Tiered Privacy Enhanced Intrusion Detection System Architecture
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). PRIvacy LEakage Methodology (PRILE) for IDS Rules
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). Privacy Violation Classification of Snort Ruleset
- Vladimir Oleshchuk, Nils Ulltveit-Moe (2010). PRIvacy LEakage Methodology (PRILE) for IDS rules
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2011). A Composite Privacy Leakage Indicator
- Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Decision-cache based XACML authorisation and anonymisation for XML documents
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Mobile Security with Location-Aware Role-Based Access Control
- Nils Ulltveit-Moe, Vladimir Oleshchuk (2013). Measuring privacy leakage for IDS rules
- Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
- Huihui Yang, Vladimir Oleshchuk (2014). An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
- Huihui Yang, Jiao Lei, Vladimir Oleshchuk (2014). A General Framework for Group Authentication and Key Exchange Protocols
- Joseph Twayigira, Vladimir Oleshchuk (2014). User authentication in mobile cloud-based crisis and emergency management
- Huihui Yang, Vladimir Oleshchuk (2015). A dynamic attribute-based authentication scheme
- Huihui Yang, Vladimir Oleshchuk (2015). ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
- Huihui Yang, Vladimir Oleshchuk (2015). An efficient traceable attribute-based authentication scheme with one-time attribute trees
- Huihui Yang, Vladimir Oleshchuk (2015). Traceable hierarchical attribute-based authentication for the cloud
- Berglind Smaradottir, Rune Werner Fensli, Vladimir Oleshchuk (2016). User-centred Design and Evaluation of Health Information Technology : Doctoral Dissertation for the Degree Philosophiae Doctor (PhD) in Information and Communication Technology
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). An attribute based access control scheme for secure sharing of electronic health records
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
- Harsha Gardiyawasam Pussewalage, Pasika Ranaweera, Vladimir Oleshchuk, Indika A.M. Balapuwaduge (2016). Secure Multi-party based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data
- Huihui Yang, Andreas Prinz, Vladimir Oleshchuk (2016). Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
- Huihui Yang, Vladimir Oleshchuk, Andreas Prinz (2016). Verifying group authentication protocols by Scyther
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). Attribute based access control scheme with controlled access delegation for collaborative E-health environments
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2018). Blockchain Based Delegatable Access Control Scheme for a Collaborative E-health Environment
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid (2018). Towards Risk-aware Access Control Framework for Healthcare Information Sharing
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2019). An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
University of Bergen
Students supervised:
- Bo Sun, 2013-2018: ‘Cloud Computing Security’
- Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
- Irene Villa, 2016-2021: ‘Optimal Boolean Functions’
- Nikolay Kaleyski, 2017-2021: ‘Properties of optimal Boolean functions’
- Diana Davidova, 2017-2021: ‘Construction and properties of cryptographic Boolean functions’
Publications co-authored with COINS students:
- Lilya Budaghyan, Oleksandr Kazymyrov (2012). Verification of Restricted EA-Equivalence for Vectorial Boolean Functions
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
- Bo Sun, Lilya Budaghyan (2018). On Classification and Some Properties of APN Functions
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stanica (2018). Partially APN Boolean functions
- Lilya Budaghyan, Marco Calderini, Irene Villa (2019). On relations between CCZ- and EA-equivalences
- Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa (2019). On Isotopic Shift Construction for Planar Functions
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stănică (2019). Partially APN Boolean functions and classes of functions that are not APN infinitely often
- Lilya Budaghyan, Marco Calderini, Irene Villa (2020). On equivalence between known families of quadratic APN functions
- Lilya Budaghyan, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). A New Family of APN Quadrinomials
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). On the Distance Between APN Functions
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stanica (2020). On the sensitivity of some permutation APN functions to swapping points
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stănică (2020). Partially APN functions with APN-like polynomial representations
- Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa (2020). Constructing APN functions through isotopic shifts
- Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa (2020). Generalized isotopic shift construction for APN functions
- Yuyin Yu, Nikolay Stoyanov Kaleyski, Lilya Budaghyan, Yongqiang Li (2020). Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9
- Diana Davidova, Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila (2021). Relation between o-equivalence and EA-equivalence for Niho bent functions
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski (2021). Towards a deeper understanding of APN functions and related longstanding problems
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stanica (2021). On the behavior of some APN permutations under swapping points
Students supervised:
- Benjamin Chetioui, 2017-2022: ‘Building High-Integrity Software using Property-Based Testing’
Publications co-authored with COINS students:
- Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià (2019). Finite difference methods fengshui: alignment through a mathematics of arrays
- Benjamin Chetioui, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Järvi, Lenore Mullin (2021). Padding in the Mathematics of Arrays
- Benjamin Chtioui Richard Chetioui, Mikhail Barash, Magne Haveraaen (2021). An Ecosystem Architecture for the Magnolia Programming Language
Students supervised:
- Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
- Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
- Chunlei Li, 2010-2014: ‘Secure Boolean Functions for Coding and Cryptography’
- Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
- Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
- Navid Ghaedi Bardeh, 2016-2019: ‘Cryptanalysis of Symmetric Cryptographic Primitives’
- Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’
Publications co-authored with COINS students:
- Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
- Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
- Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
- Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
- Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher
- Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
- Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
- Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
- Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
- Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
- Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
- Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
- Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth (2017). Yoyo tricks with AES
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions
- Lilya Budaghyan, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). A New Family of APN Quadrinomials
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). On the Distance Between APN Functions
- Diana Davidova, Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila (2021). Relation between o-equivalence and EA-equivalence for Niho bent functions
Students supervised:
- Tetiana Yarygina, 2013-2018: ‘Robust and secure cloud services’
- Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’
Publications co-authored with COINS students:
- Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
- Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations
Students supervised:
- Benjamin Chetioui, 2017-2022: ‘Building High-Integrity Software using Property-Based Testing’
Publications co-authored with COINS students:
- Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi (2018). Exploring Microservice Security
- Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià (2019). Finite difference methods fengshui: alignment through a mathematics of arrays
Students supervised:
- Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
Publications co-authored with COINS students:
- Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher
Students supervised:
- Bo Sun, 2013-2018: ‘Cloud Computing Security’
Publications co-authored with COINS students:
- Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
- Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
- Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions
Students supervised:
- Kyrre Wahl Kongsgaard, 2015-2017: ‘data exfiltration detection and prevention (employer: FFI)’
Students supervised:
- Dan Zhang, 2017-2021: ‘Self-dual quantum codes’
- Sachin Valera, 2016-2019: ‘Quantum Machine Learning’
Publications co-authored with COINS students:
- Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
Students supervised:
- Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
- Srimathi Varadharajan, 2015-2020: ‘Application of BDD to Cryptography’
- John Petter Indrøy, 2018-2021: ‘Application of Compressed Right Hand Sides on AES (employer: Simula UiB)’
- Martha Norberg Hovd, 2018-2022: ‘Security of Homomorphic Encryption’
- Morten Øygarden, 2018-2021: ‘Quantum Safe Cryptography’
Publications co-authored with COINS students:
- Mithilesh Kumar, Håvard Raddum, Srimathi Varadharajan (2019). Reducing lattice enumeration search trees
- Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum (2021). A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
- Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum (2022). On the IND-CCA1 Security of FHE Schemes
Students supervised:
- Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
- Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’
- Reent Schlegel, 2018-2021: ‘Private Edge Computing (employer: Simula UiB)’
- Issam Maarouf, 2019-2023: ‘Coding for DNA-based storage’
Students supervised:
- Navid Ghaedi Bardeh, 2016-2019: ‘Cryptanalysis of Symmetric Cryptographic Primitives’
Publications co-authored with COINS students:
- Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth (2017). Yoyo tricks with AES
- Navid Ghaedi Bardeh, Sondre Rønjom (2019). Practical attacks on reduced-round AES
- Navid Ghaedi Bardeh, Sondre Rønjom (2019). The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts
Students supervised:
- Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
- Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’
- Isaac Canales Martinez, 2017-2020: ‘Algebraic analysis of Stream ciphers’
- Alessandro Budroni, 2017-2021: ‘Cryptoanalysis on LWE’
Publications co-authored with COINS students:
- Stian Fauskanger, Igor A. Semaev (2015). Statistical and Algebraic Properties of DES
- Stian Fauskanger, Igor A. Semaev (2016). Statistical and Algebraic Properties of DES
Students supervised:
- Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
- Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’
- Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
- Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
- Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’
- Morten Øygarden, 2018-2021: ‘Quantum Safe Cryptography’
- Arne Tobias Malkenes Ødegaard, 2019-2022: ‘Post-quantum zk-SNARKs (employer: Simula UiB)’
- Nicolas Costes, 2019-2022: ‘High Performance Power Analysis Attacks (employer: Simula UiB)’
Publications co-authored with COINS students:
- Mohsen Toorani, Øyvind Ytrehus (2015). Security protocols and related topics
- Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
- Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations
University of Oslo
Students supervised:
- Samson Yoseph Esayas, 2015-2020: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’
- Worku Gedefa Urgessa, 2017-2020: ‘The Role of IGOs and International Law in Securing Cyberspace’
- Luca Tosoni, 2017-2020: ‘Regulating Cybersecurity: Challenges, Limits and Regulatory Options’
- Peter Davis, 2018-2021: ‘Regulation of Cryptography: Logical, Legal and Normative Limits’
Students supervised:
- Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’
- Sara Mohammadi, 2018-2021: ‘Cyber-attack detection in smart grids with prosumers using machine learning’
- Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’
Publications co-authored with COINS students:
- Sara Mohammadi, Frank Eliassen, Yan Zhang (2020). Effects of false data injection attacks on a local P2P energy trading market with prosumers
- Sara Mohammadi, Frank Eliassen, Yan Zhang, Hans-Arno Jacobsen (2021). Detecting false data injection attacks in peer to peer energy trading using machine learning
Students supervised:
- Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’
- Desta Haileselassie Hagos, 2015-2020: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’
- Ramtin Aryan, 2016-2020: ‘Software-Defined Networking Policy Conflict Detection: a holistic approach (employer: Høgskolen i Oslo og Akershus)’
Students supervised:
- Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’
Students supervised:
- Åvald Åslaugson Sommervoll, 2018-2022: ‘Consequences of machine learning and quantum computing in the field of cryptology’
Students supervised:
- Tamás Bisztray, 2019-2021: ‘Privacy by Design in Digital Infrastructures’
Publications co-authored with COINS students:
- Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen (2018). Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
Students supervised:
- Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’
Publications co-authored with COINS students:
- Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
- Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
- Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
- Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
- Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
- Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
- Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Nikhil Kumar Tomar, Sharib Ali, Michael A. Riegler, Håvard D. Johansen, Thomas de Lange, Pål Halvorsen (2021). NanoNet: Real-Time Polyp Segmentation in VideoCapsule Endoscopy and Colonoscopy
- Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael A. Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Ove Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
- Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
- Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
- Nikhil Kumar Tomar, Nabil Ibtehaz, Debesh Jha, Pål Halvorsen, Sharib Ali (2021). Improving generalizability in polyp segmentation using ensemble convolutional neural network
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset
- Sharib Ali, Noha Ghatwary, Debesh Jha, Pål Halvorsen (2021). Proceedings of the 3rd International Workshop and Challenge on Computer Vision in Endoscopy (EndoCV 2021)
- Steven Hicks, Debesh Jha, Vajira L B Thambawita, Pål Halvorsen, Bjørn Jostein Singstad, Sachin Gaur, Klas Pettersen, Morten Goodwin, Sravanthi Parasa, Thomas de Lange, Michael Alexander Riegler (2021). MedAI: Transparency in Medical Image Segmentation
- Steven A. Hicks, Debesh Jha, Vajira L B Thambawita, Hugo Lewi Hammer, Thomas de Lange, Sravanthi Parasa, Michael Riegler, Pål Halvorsen (2021). Medico Multimedia Task at MediaEval 2021: Transparency in Medical Image Segmentation
Students supervised:
- Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’
- Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
- Elahe Fazeldehkordi, 2017-2021: ‘Semantic Modelling and Measuring of Privacy for IoT in Smart Home’
- Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’
Publications co-authored with COINS students:
- Manish Shrestha, Christian Johansen, Josef Noll (2017). Security Classification for Smart Grid Infra structures (long version)
- Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
- Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
- Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen (2018). The Future Mechanism and Information Flow Security
- Manish Shrestha, Christian Johansen, Josef Noll (2019). Criteria for Security Classification of Smart Home Energy Management Systems (long version)
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Criteria for security classification of smart home energy management systems
- Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures
- Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll (2020). Tool Support for Security Classification for Internet of Things (long version)
- Shukun Tokas, Olaf Owe, Christian Johansen (2020). Code Diversification Mechanisms for Internet of Things (Revised Version 2)
- Johanna Johansen, Josef Noll, Christian Johansen (2021). InfoInternet for education in the Global South: A study of applications enabled by free information-only internet access in technologically disadvantaged areas
- Johanna Johansen, Tore Pedersen, Christian Johansen (2021). Studying human-to-computer bias transference
Students supervised:
- Ijlal Loutfi, 2014-2019: ‘Secure and Robust Network-based Systems’
- Antonio Gonzalez Burgueño, 2014-2020: ‘Formal analysis for security ceremonies’
- Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’
- Vasileios Mavroeidis, 2016-2019: ‘Cyberthreat Detection and Analysis’
- Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
- Kamer Vishi, 2016-2019: ‘Multimodal Biometrics in Identity and Access Management (IAM)’
- Jon-Martin Storm, 2018-2021: ‘Efficient Cybersecurity Mechanisms for ICS and SCADA (employer: The Norwegian Water Resources and Energy Directorate)’
- Åvald Åslaugson Sommervoll, 2018-2022: ‘Consequences of machine learning and quantum computing in the field of cryptology’
Publications co-authored with COINS students:
- Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic cyberthreat modelling
- Vasileios Mavroeidis, Audun Jøsang (2018). Data-Driven Threat Hunting Using Sysmon
- Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang (2018). A framework for data-driven physical security and insider threat detection
- Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang (2018). The impact of quantum computing on present cryptography
- Siri Bromander, Lilly Pijnenburg Muller, Martin Eian, Audun Jøsang (2020). Examining the “Known Truths” in Cyber Threat Intelligence – The Case of STIX
- Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg (2021). Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
- Åvald Åslaugson Sommervoll, Audun Jøsang (2021). Machine Learning for Offensive Cyber Operations
Students supervised:
- Peter Davis, 2018-2021: ‘Regulation of Cryptography: Logical, Legal and Normative Limits’
Publications co-authored with COINS students:
- Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2015). Using Technology to Enhance Confidentiality and Regulatory Compliance by Design
- Samson Yoseph Esayas, Tobias Mahler (2015). Modelling compliance risk: a structured approach
- Samson Yoseph Esayas, Tobias Mahler, Bjørnar Solhaug (2015). An Integrated Approach for Compliance and Security Risk Assessment
- Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjørnstad, Veda Brubakk (2015). An integrated method for compliance and risk assessment
- Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2016). Give Me a Sign: Expressing Contract Terms and Data Protection Requirements Visually in Cloud Computing
- Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2016). Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements for Cloud Computing Users
Students supervised:
- Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
- Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’
- Maghsoud Morshedi Chinibolagh, 2017-2021: ‘Application specific routing for managed wireless access (employer: EyeNetworks)’
Publications co-authored with COINS students:
- Seraj Fayyad, Josef Noll (2014). Security and Safety Composition Methodology
- Seraj Fayyad, Josef Noll (2014). Toward Real Time IT Risk Assessment Methodology
- Iñaki Garitano, Seraj Fayyad, Josef Noll (2015). Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
- Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids
- Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
- Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
- Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse (2017). Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial
- Manish Shrestha, Christian Johansen, Josef Noll (2017). Security Classification for Smart Grid Infra structures (long version)
- Seraj Fayyad, Josef Noll (2017). A Framework for Measurability of Security
- Maghsoud Morshedi, Josef Noll, Raheleh Kari (2018). Building Trustable Remote Monitoring and Management Systems
- Maghsoud Morshedi, Josef Noll (2019). Deploying Energy Efficient Wi-Fi Networks
- Manish Shrestha, Christian Johansen, Josef Noll (2019). Criteria for Security Classification of Smart Home Energy Management Systems (long version)
- Maghsoud Morshedi Chinibolagh, Josef Alfons Noll (2020). A Survey on Prediction of PQoS Using Machine Learning on Wi-Fi Networks
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
- Manish Shrestha, Christian Johansen, Josef Noll (2020). Criteria for security classification of smart home energy management systems
- Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures
- Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll (2020). Tool Support for Security Classification for Internet of Things (long version)
- Johanna Johansen, Josef Noll, Christian Johansen (2021). InfoInternet for education in the Global South: A study of applications enabled by free information-only internet access in technologically disadvantaged areas
- Maghsoud Morshedi, Josef Noll (2021). Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning
- Maghsoud Morshedi, Josef Noll (2021). Estimating PQoS of Video Streaming on Wi-Fi Networks Using Machine Learning
Students supervised:
- Kyrre Wahl Kongsgaard, 2015-2017: ‘data exfiltration detection and prevention (employer: FFI)’
Students supervised:
- Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’
- Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’
- Farzane Karami, 2017-2020: ‘Language-Based Security, Addressing Active Object and Distributed Systems’
- Johanna Johansen, 2018-2021: ‘Human Aspects of Privacy in IoT’
Publications co-authored with COINS students:
- Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
- Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2018). An Evaluation of Interaction Paradigms for Active Objects
- Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen (2018). The Future Mechanism and Information Flow Security
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2018). Language-Based Support for GDPR-Related Privacy Requirements
- Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas (2018). A secrecy-preserving language for distributed and object-oriented systems
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2019). Summary of: An Evaluation of Interaction Paradigms for Active Objects
- Shukun Tokas, Olaf Owe (2019). A Formal Framework for Consent Management
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2019). Language-Based Mechanisms for Privacy by Design
- Farzane Karami, Olaf Owe, Gerardo Schneider (2020). Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures. In Proceedings of The 25th Nordic Conference on Secure IT Systems (NortdSec 2020). To appear in Lecture Notes in Computer Science (17 pages)
- Shukun Tokas, Olaf Owe (2020). A Formal Framework for Consent Management
- Shukun Tokas, Olaf Owe, Christian Johansen (2020). Code Diversification Mechanisms for Internet of Things (Revised Version 2)
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2020). Language-based mechanisms for privacy-by-design
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2021). Static checking of GDPR-related privacy compliance for object-oriented distributed systems
Students supervised:
- Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’
Publications co-authored with COINS students:
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2018). An Evaluation of Interaction Paradigms for Active Objects
- Shukun Tokas, Toktam Ramezanifarkhani (2018). Language-Based Support for GDPR-Related Privacy Requirements
- Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas (2018). A secrecy-preserving language for distributed and object-oriented systems
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2019). Summary of: An Evaluation of Interaction Paradigms for Active Objects
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2019). Language-Based Mechanisms for Privacy by Design
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2020). Language-based mechanisms for privacy-by-design
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2021). Static checking of GDPR-related privacy compliance for object-oriented distributed systems
Students supervised:
- Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’
Students supervised:
- Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’
Students supervised:
- Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’
Publications co-authored with COINS students:
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2018). Sensor Sequential Data Prediction
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults
Students supervised:
- Xiaojie Zhu, 2015-2019: ‘ConSeRNS’
- Mohammad Hossein Tabatabaei, 2018-2021: ‘Scalable and secure storage of healthcare blockchain’
Students supervised:
- Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’
Students supervised:
- Sara Mohammadi, 2018-2021: ‘Cyber-attack detection in smart grids with prosumers using machine learning’
- Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’
Publications co-authored with COINS students:
- Sara Mohammadi, Frank Eliassen, Yan Zhang (2020). Effects of false data injection attacks on a local P2P energy trading market with prosumers
- Sara Mohammadi, Frank Eliassen, Yan Zhang, Hans-Arno Jacobsen (2021). Detecting false data injection attacks in peer to peer energy trading using machine learning
Students supervised:
- Antonio Gonzalez Burgueño, 2014-2020: ‘Formal analysis for security ceremonies’
Students supervised:
- Samson Yoseph Esayas, 2015-2020: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’
University of Stavanger
Students supervised:
- Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
- Cristina Heghedus, 2016-2020: ‘Dara driven energy informatics’
- Aida Mehdipour Pirbazari, 2017-2021: ‘Predictive Analytics for power stability in smart communities’
- Nikita Karandikar, 2018-2021: ‘Driving behavior change by incentivizing households to trade renewable energy in a gamified community level marketplace’
- Dhanya Therese Jose, 2018-2021: ‘Security and privacy for data-driven energy informatics’
Publications co-authored with COINS students:
- Tim Majchrzak, Antorweep Chakravorty (2012). Improving the Compliance of Transplantation Medicine Patients with an Integrated Mobile System
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
- Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
- Antorweep Chakravorty (2014). Amerikanere hyller norsk student-idé
- Antorweep Chakravorty (2014). Smart eller overvåket?
- Antorweep Chakravorty (2014). Spørsmål om Smarthus
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Informatics Applicability; Machine Learning and Deep Learning
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Load Forecasting Using Deep Learning
- Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Frameworks. Comparison on Public Transportation Prediction
- Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Architectures for Electricity Consumption Forecasting
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2020). Deep Learning for Short-Term Energy Load Forecasting Using Influential Factors
Students supervised:
- Jayachander Surbiryala, 2016-2019: ‘Information Security in Cloud Computing’
- Bo Sun, 2013-2018: ‘Cloud Computing Security’
- Wrya Kadir, 2018-2022: ‘Code Based Cryptography’
- Ermes Franch, 2019-2023: ‘Code base Cryptography’
Publications co-authored with COINS students:
- Chunlei Li, Xiangyong Zeng, Lei Hu (2010). A class of binary cyclic codes with five weights
- Houzhen Wang, Chunlei Li (2010). Design theory and method of multivariate hash function
- Huanguo Zhang, Chunlei Li, Ming Tang (2011). Capability of evolutionary cryptosystems against differential cryptanalysis
- Huanguo Zhang, Chunlei Li, Ming Tang (2011). Evolutionary cryptography against multidimensional linear cryptanalysis
- Chunlei Li (2012). The lower bound of the second order nonlinearity of a class of Bent functions
- Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
- Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
- Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
- Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
- Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
- Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li (2013). A family of quadriphase sequences of period 4(2 n−1)with low correlation and large linear span
- Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
- Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
- Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
- Chunlei Li (2014). Sequences and Linear Codes from Highly Nonlinear Functions
- Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
- Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan (2014). Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
- Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
- Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
- Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
- Jayachander Surbiryala, Chunlei Li, Rong Chunming (2017). A framework for improving security in cloud computing
Students supervised:
- Mohammad Hossein Tabatabaei, 2018-2021: ‘Scalable and secure storage of healthcare blockchain’
Students supervised:
- Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’
- Antorweep Chakravorty, 2012-2015: ‘Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes’
- Aryan TaheriMonfared, 2012-2015: ‘Building Network Security Services Using Software Defined Networking’
- Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
- Jayachander Surbiryala, 2016-2019: ‘Information Security in Cloud Computing’
- Cristina Heghedus, 2016-2020: ‘Dara driven energy informatics’
- Aida Mehdipour Pirbazari, 2017-2021: ‘Predictive Analytics for power stability in smart communities’
- Nikita Karandikar, 2018-2021: ‘Driving behavior change by incentivizing households to trade renewable energy in a gamified community level marketplace’
- Dhanya Therese Jose, 2018-2021: ‘Security and privacy for data-driven energy informatics’
Publications co-authored with COINS students:
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Aryan TaheriMonfared, Chunming Rong (2013). Multi-tenant Network Monitoring Based on Software Defined Networking
- Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
- Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
- Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
- Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
- Aryan TaheriMonfared, Chunming Rong (2015). Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants
- Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
- Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System
- Bikash Agrawal, Jayachander Surbiryala, Rong Chunming (2017). Resource Allocation in Cloud-Based Distributed Cameras
- Jayachander Surbiryala, Chunlei Li, Rong Chunming (2017). A framework for improving security in cloud computing
- Anton Shchipanov, Roman Berenblyum, Alexey A. Khrulenko, Lars Kollbotn, Rong Chunming, Cristina Viorica Heghedus, Fredrik Haugsand (2018). Well Data Analytics: from Case Studies to Solutions
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Informatics Applicability; Machine Learning and Deep Learning
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Load Forecasting Using Deep Learning
- Jayachander Surbiryala, Rong Chunming (2018). Data Recovery and Security in Cloud
- Jayachander Surbiryala, Rong Chunming (2018). Data recovery in cloud using forensic tools
- Jayachander Surbiryala, Rong Chunming (2018). Secure customer data over cloud forensic reconstruction
- Jayachander Surbiryala, Bikash Agrawal, Rong Chunming (2018). Improve Security Over Multiple Cloud Service Providers for Resource Allocation
- Cristina Viorica Heghedus, Anton Shchipanov, Chunming Rong (2019). Pattern Recognition and Flow Rate Reconstruction: PDG Data Analysis Using Machine Learning
- Cristina Viorica Heghedus, Anton Shchipanov, Rong Chunming (2019). Advancing Deep Learning to Improve Upstream Petroleum Monitoring
- Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Frameworks. Comparison on Public Transportation Prediction
- Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Architectures for Electricity Consumption Forecasting
- Jayachander Surbiryala, Rong Chunming (2019). Cloud Computing: History and Overview
- Cristina Viorica Heghedus, Rong Chunming (2020). Artificial Intelligence Models Used for Prediction in the Energy Internet
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2020). Deep Learning for Short-Term Energy Load Forecasting Using Influential Factors
Students supervised:
- Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’
Publications co-authored with COINS students:
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
- Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
- Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
- Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
- Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
- Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
- Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System
University of Tromsø
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing
- Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
- Kassaye Yitbarek Yigzaw, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow infectious disease forecast service
- Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Stein Olav Skrøvseth, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Per Atle Bakkevoll, Gunnar Skov Simonsen, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow communicable disease outbreak detection approach
- Johan Gustav Bellika, Torje Dahle Henriksen, Kassaye Yitbarek Yigzaw (2014). The Snow System – a Decentralized Medical Data Processing System
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of Secure Multi-Party Computation for Reuse of Distributed Electronic Health Data
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of secure multi-party computation for reuse of distributed electronic health data
- Luis Marco Ruiz, Pablo Pazos, Koray Atalag, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Enabling Clinical Data Reuse with openEHR Data Warehouse Environments
- Meskerem Asfaw Hailemichael, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Emnet: a tool for privacy-preserving statistical computing on distributed health data
- Andrius Budrionis, Luis Marco-Ruiz, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
- Andrius Budrionis, Marco-ruiz Luis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
- Kassaye Yitbarek Yigzaw, Antonis Michalas, Johan Gustav Bellika (2016). Secure and scalable statistical computation of questionnaire data in R
- Luis Marco Ruiz, Andrius Budrionis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Interoperability Mechanisms of Clinical Decision Support Systems: A Systematic Review
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
- Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
- Daniel Karlsson, Andrius Budrionis, Ann Bygholm, Mariann Fossum, Conceicao Granja, Gunnar Hartvigsen, Ole Hejlesen, Maria Hägglund, Monika Alise Johansen, Lars Lindsköld, Santiago Martinez, Carl Erik Moe, Luis Marco Ruiz, Vivian Vimarlund, Kassaye Yitbarek Yigzaw (2016). Proceedings from The 14th Scandinavian Health Informatics Conference 2016
- Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen (2019). K-CUSUM: Cluster Detection Mechanism in EDMON
- Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen (2019). K-CUSUM: Cluster Detection Mechanism in EDMON
- Prosper Yeng, Ashenafi Zebene Woldaregay, Terje Geir Solvoll, Gunnar Hartvigsen (2020). Cluster detection mechanisms for syndromic surveillance systems: Systematic review and framework development
Students supervised:
- Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’
Publications co-authored with COINS students:
- Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
- Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
- Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
- Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
- Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
- Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
- Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
- Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Nikhil Kumar Tomar, Sharib Ali, Michael A. Riegler, Håvard D. Johansen, Thomas de Lange, Pål Halvorsen (2021). NanoNet: Real-Time Polyp Segmentation in VideoCapsule Endoscopy and Colonoscopy
- Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael A. Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Ove Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
Students supervised:
- Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’
Publications co-authored with COINS students:
- Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
- Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
- Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
- Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
- Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
- Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
- Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
- Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset
Students supervised:
- Jan Roksvold, 2011-2015: ‘Matroidal structures’
Publications co-authored with COINS students:
- Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid
Students supervised:
- Jan Roksvold, 2011-2015: ‘Matroidal structures’
Publications co-authored with COINS students:
- Jan Nyquist Roksvold, Hugues Verdure (2013). The generalized weight polynomial – and how it is determined by Betti-numbers
- Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid
External supervisors
Students supervised:
- Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’
Publications co-authored with COINS students:
- Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids
Students supervised:
- Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
Publications co-authored with COINS students:
- Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic cyberthreat modelling
- Siri Bromander, Lilly Pijnenburg Muller, Martin Eian, Audun Jøsang (2020). Examining the “Known Truths” in Cyber Threat Intelligence – The Case of STIX
- Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg (2020). Modeling Cyber Threat Intelligence
- Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg (2021). Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
Students supervised:
- Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’
Publications co-authored with COINS students:
- Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm
Students supervised:
- Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’
Publications co-authored with COINS students:
- Lothar Fritsch, Ebenezer Paintsil (2010). 1st PhD retreat documentation – Minutes of the PETweb II PhD workshop, April 15-16, 2010
- Ebenezer Paintsil, Lothar Fritsch (2011). A Taxonomy of Privacy and Security Risks Contributing Factors
- Ebenezer Paintsil, Lothar Fritsch (2011). Taxonomy of Privacy and Security Risks Contributing Factors
- Ebenezer Paintsil, Lothar Fritsch (2011). Towards Legal Privacy Risk Assessment Automation in Social Media
- Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets
- Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems
- Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems
Students supervised:
- Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’
Students supervised:
- Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
- Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’
Students supervised:
- Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’
Publications co-authored with COINS students:
- Jon-Martin Storm, Janne Merete Hagen, Øyvind Anders Arntzen Toftegaard (2021). A Survey of Using Process Data and Features of Industrial Control Systems in Intrusion Detection
Students supervised:
- Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
Students supervised:
- Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’
Publications co-authored with COINS students:
- Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok (2018). Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
- Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin (2018). Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
- Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo (2018). Cognitive Profiles of Female Cyber Defence Operators
- Kirsi Marjaana Helkala, Benjamin James Knox (2018). Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
- Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala (2018). Macrocognitive approaches on Cyber Performance
- Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin (2018). Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition
- Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen (2018). Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
- Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark (2018). An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
- Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower
- Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Cognitive Profiles and Education of Female Cyber Defence Operators
- Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala (2019). Self-regulation and cognitive agility in cyber operations
- Sjur Johansen Øfsteng, Ina Garthe, Øyvind Jøsok, Silje Knox, Kirsi Marjaana Helkala, Benjamin James Knox, Stian Ellefsen, Bent Rønnestad (2020). No effect of increasing protein intake during military exercise with severe energy deficit on body composition and performance
Students supervised:
- Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’
Students supervised:
- Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’
Students supervised:
- Altynay Kadyrova, 2019-2022: ‘Quality Assessment for Material Appearance’
Students supervised:
- Arne Tobias Malkenes Ødegaard, 2019-2022: ‘Post-quantum zk-SNARKs (employer: Simula UiB)’
- Roberto Parisella, 2020-2023: ‘Efficient NIZK under trusted assumptions (employer: Simula UiB)’
Students supervised:
- Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’
Students supervised:
- Syed Moeen Ali Naqvi, 2020-2023: ‘Towards Self-Healing Software through Anomaly Detection and Adaptive learning (employer: Simula Research Laboratory)’
Students supervised:
- Åvald Åslaugson Sommervoll, 2018-2022: ‘Consequences of machine learning and quantum computing in the field of cryptology’
Students supervised:
- Pawel Drozdowski, 2016-2020: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’
Students supervised:
- Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’
Students supervised:
- Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’
Publications co-authored with COINS students:
- Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
- Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
- Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
- Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
- Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
- Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
- Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
- Tobias Ross, Annika Reinke, Peter M. Full, Martin Wagner, Hannes Kenngott, Martin Apitz, Hellena Hempe, Diana Mindroc Filimon, Patrick Scholz, Thuy Nuong Tran, Pierangela Bruno, Pablo Arbeláez, Gui-Bin Bian, Sebastian Bodenstedt, Jon Lindström Bolmgren, Laura Bravo-Sánchez, Hua-Bin Chen, Cristina González, Dong Guo, Pål Halvorsen, Pheng-Ann Heng, Enes Hosgor, Zeng-Guang Hou, Fabian Isensee, Debesh Jha, Tingting Jiang, Yueming Jin, Kadir Kirtac, Sabrina Kletz, Stefan Leger, Zhixuan Li, Klaus H. Maier-Hein, Zhen-Liang Ni, Michael Riegler, Klaus Schoeffmann, Ruohua Shi, Stefanie Speidel, Michael Stenzel, Isabell Twick, Gutai Wang, Jiacheng Wang, Liansheng Wang, Lu Wang, Yujie Zhang, Yan-Jie Zhou, Lei Zhu, Manuel Wiesenfarth, Annette Kopp-Schneider, Beat P. Müller-Stich, Lena Maier-Hein (2020). Comparative validation of multi-instance instrument segmentation in endoscopy: results of the ROBUST-MIS 2019 challenge
- Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
- Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
- Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
- Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
- Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
- Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
- Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
- Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
- Enrique Garcia-Ceja, Vajira L B Thambawita, Steven Hicks, Debesh Jha, Petter Jakobsen, Hugo Lewi Hammer, Pål Halvorsen, Michael Riegler (2021). HTAD: A Home-Tasks Activities Dataset with Wrist-Accelerometer and Audio Features
- Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
- Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
- Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset
- Steven Hicks, Debesh Jha, Vajira L B Thambawita, Pål Halvorsen, Bjørn Jostein Singstad, Sachin Gaur, Klas Pettersen, Morten Goodwin, Sravanthi Parasa, Thomas de Lange, Michael Alexander Riegler (2021). MedAI: Transparency in Medical Image Segmentation
- Steven A. Hicks, Debesh Jha, Vajira L B Thambawita, Hugo Lewi Hammer, Thomas de Lange, Sravanthi Parasa, Michael Riegler, Pål Halvorsen (2021). Medico Multimedia Task at MediaEval 2021: Transparency in Medical Image Segmentation
Students supervised:
- Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’
Publications co-authored with COINS students:
- Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures
Students supervised:
- Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’
Publications co-authored with COINS students:
- Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
Students supervised:
- Hans Heum, 2019-2021: ‘Side-channel attacks in a multi-user setting (employer: Simula UiB)’
- Alessandro Melloni, 2019-2022: ‘Security of Protocols and Privacy Enhancing Technologies (employer: Simula UiB)’
- Nicolas Costes, 2019-2022: ‘High Performance Power Analysis Attacks (employer: Simula UiB)’
Students supervised:
- Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’
Publications co-authored with COINS students:
- Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok (2018). Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
- Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin (2018). Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
- Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo (2018). Cognitive Profiles of Female Cyber Defence Operators
- Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala (2018). Macrocognitive approaches on Cyber Performance
- Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin (2018). Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition
- Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen (2018). Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
- Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark (2018). An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
- Benjamin James Knox, Ricardo Gregorio Lugo, Stefan Sütterlin (2019). Cognisance as a human factor in military cyber defence education
- Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower
- Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin (2019). Cyber Defense Officer Profiles and Performance factors
- Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Cognitive Profiles and Education of Female Cyber Defence Operators
- Stefan Sütterlin, Benjamin James Knox, Ricardo Gregorio Lugo (2019). TalTechi küberkaitseteadlased: ainult tehnilistest oskustest ja teadmistest küberkaitses ei piisa
- Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala (2019). Self-regulation and cognitive agility in cyber operations
- Ricardo Gregorio Lugo, Benjamin James Knox, Øyvind Jøsok, Stefan Sütterlin (2020). Variable Self-efficacy as a Measurement for Behaviors in Cyber Security Operations
Students supervised:
- Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’
Publications co-authored with COINS students:
- Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm
Students supervised:
- Altynay Kadyrova, 2019-2022: ‘Quality Assessment for Material Appearance’
Students supervised:
- Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’
Publications co-authored with COINS students:
- Flavia Dias Casagrande, Evi Zouganeli (2018). Occupancy and Daily Activity Event Modelling in Smart Homes for Older Adults with Mild Cognitive Impairment or Dementia
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2018). Sensor Sequential Data Prediction
- Evi Zouganeli, Flavia Dias Casagrande (2019). Hvordan kan kunstig intelligens støtte eldre til å leve et selvstendig liv hjemme og hva har Assisted Living prosjektet bidratt med.
- Flavia Dias Casagrande, Evi Zouganeli (2019). Activity Recognition and Prediction in Real Homes
- Flavia Dias Casagrande, Evi Zouganeli (2019). Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults
- Flavia Dias Casagrande, Oda Olsen Nedrejord, Wonho Lee, Evi Zouganeli (2019). Action Recognition in Real Homes using Low Resolution Depth Video Data
Students supervised:
- Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’