Active supervisors

Norwegian University of Science and Technology


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/finnarve

Students supervised:

  • Marija Gajic, 2017-2022: ‘Policy – based network applications and service configuration’


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/stefan.axels…

Students supervised:

  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
  • Gunnar Alendal, 2016-2020: ‘Security vulnerability research for use in digital forensic acquisition’
  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/kerstin.b…

Students supervised:

  • Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’


E-mail:            [email protected]
Homepage:    http://www.ansatt.hig.no/patrickb/

Students supervised:

Publications co-authored with COINS students:

  1. Patrick Bours, Soumik Mondal (2013). Continuous Authentication using Behavioural Biometrics
  2. Soumik Mondal, Patrick Bours (2013). Continuous Authentication using Mouse Dynamics
  3. Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus (2013). Complexity measurement of a password for keystroke dynamics: preliminary study
  4. Soumik Mondal, Patrick Bours (2014). Continuous Authentication using Fuzzy Logic
  5. John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia (2015). One-handed Keystroke Biometric Identification Competition
  6. Patrick Bours, Soumik Mondal (2015). Continuous Authentication with Keystroke Dynamics
  7. Patrick Bours, Soumik Mondal (2015). Performance evaluation of continuous authentication systems
  8. Soumik Mondal, Patrick Bours (2015). A Computational Approach to the Continuous Authentication Biometric System
  9. Soumik Mondal, Patrick Bours (2015). Context independent continuous authentication using behavioural biometrics
  10. Soumik Mondal, Patrick Bours (2015). Continuous Authentication in a Real World Settings
  11. Soumik Mondal, Patrick Bours (2015). Continuous authentication and identification for mobile devices: Combining security and forensics
  12. Soumik Mondal, Patrick Bours (2015). Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device
  13. Soumik Mondal, Patrick Bours (2015). Swipe Gesture based Continuous Authentication for Mobile Devices
  14. Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours (2015). Keystroke Dynamics Performance Enhancement With Soft Biometrics
  15. Soumik Mondal, Patrick Bours (2016). Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification
  16. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours (2017). Classification of Fingerprints Captured Using Optical Coherence Tomography
  17. Ali Khodabakhsh, Erwin Haasnoot, Patrick Bours (2018). Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics
  18. Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours (2019). Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
  19. Guoqiang Li, Parisa Rezaee Borj, Loic Bergeron, Patrick Bours (2019). Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chatting Data
  20. Parisa Rezaee Borj, Patrick Bours (2019). Detecting Liars in Chats using Keystroke Dynamics
  21. Parisa Rezaee Borj, Patrick Bours (2019). Detecting Liars in Chats using Keystroke Dynamics
  22. Parisa Rezaee Borj, Patrick Bours (2019). Predatory Conversation Detection
  23. Parisa Rezaee Borj, Kiran Bylappa Raja, Patrick Bours (2019). On Preprocessing the Data for Improving Sexual Predator Detection
  24. Muhammad Ali Fauzi, Patrick Bours (2020). Ensemble Method for Sexual Predators Identification in Online Chats
  25. Parisa Rezaee Borj, Kiran Raja, Patrick Bours (2021). Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles


E-mail:            [email protected]
Homepage:    http://www.item.ntnu.no/people/personalp…

Students supervised:

  • Britta Hale, 2014-2017: ‘Modelling and Analysis of Real-World Cryptographic Authentication and Key-Exchange Protocols’
  • Chris Carr, 2014-2019: ‘Protection in Complex Cyber Systems’
  • Enio Marku, 2017-2021: ‘Securing emerging network technologies with homomorphic encryption’
  • Bor de Kock, 2018-2022: ‘Post-Quantum Key Exchanges’
  • Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
  • Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
  • Morten Solberg, 2019-2023: ‘Secure, Usable and Robust Cryptographic Voting Systems’
  • Sonu Jha, 2019-2023: ‘Lightweight Cryptography for Future Smart Networks’
  • Lise Millerjord, 2019-2024: ‘Lightweight Cryptography for Future Smart Networks’

Publications co-authored with COINS students:

  1. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  2. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  3. Colin Alexander Boyd, Britta Hale (2016). Secure Channels and Termination: The Last Word on TLS
  4. Colin Alexander Boyd, Christopher Carr (2016). Fair client puzzles from the Bitcoin blockchain
  5. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
  6. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  7. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  8. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
  9. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines (2016). Key Recovery: Inert, Public, Transparent (KRIPT)
  10. Colin Alexander Boyd, Britta Hale (2017). Secure Channels and Termination: The Last Word on TLS
  11. Colin Alexander Boyd, Christopher Carr, Xavier Boyen, Thomas Haines (2017). Bitcoin Unchained
  12. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines (2017). Key recovery: Inert and public
  13. Colin Alexander Boyd, Christopher Carr (2018). Valuable Puzzles for Proofs-of-Work
  14. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2018). Offline Assisted Group Key Exchange
  15. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2020). Fast and Secure Updatable Encryption
  16. shuang wu, Kristian Gjøsteen, Colin Alexander Boyd (2020). A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
  17. Colin Alexander Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord (2021). Symmetric Key Exchange with Full Forward Security and Robust Synchronization


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/edmund.br…

Students supervised:


E-mail:            [email protected]
Homepage:    http://www.christoph-busch.de/

Students supervised:

  • Martin Aastrup Olsen, 2011-2015: ‘Fingerprint Image Quaity (employer: CASED)’
  • Anika Pflug, 2011-2015: ‘2D and 3D Ear Recognition (employer: CASED)’
  • Ctirad Sousedik, 2012-2018: ‘Fake Resistant Fingerprint Biometrics’
  • Guoqiang Li, 2012-2016: ‘Biometric indexing’
  • Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
  • Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’
  • Patrick Schuch, 2015-2019: ‘Representation Learning for Fingerprint Recognition (employer: Dermalog)’
  • Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
  • Pawel Drozdowski, 2016-2020: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’
  • Ali Khodabakhsh, 2017-2021: ‘Automated Authentication of Audiovisual Contents: A Biometric Approach’
  • Hareesh Mandalapu, 2017-2020: ‘Presentation Attack Detection in Iris and Ocular biometrics’
  • Muhammad Ali Fauzi, 2019-2022: ‘Modelling Healthcare Staffs’ Mental State to Minimize Cybersecurity Risk’

Publications co-authored with COINS students:

  1. Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
  2. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  3. Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
  4. Ctirad Sousedik, Ralph Breithaupt, Christoph Busch (2013). Volumetric Fingerprint Data Analysis using Optical Coherence Tomography
  5. Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
  6. Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
  7. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
  8. Martin Aastrup Olsen, Elham Tabassi, Anton Makarov, Christoph Busch (2013). Self-Organizing Maps for Fingerprint Image Quality Assessment
  9. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  10. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  11. Ctirad Sousedik, Christoph Busch (2014). Presentation attack detection methods for fingerprint recognition systems: a survey
  12. Ctirad Sousedik, Christoph Busch (2014). Quality of Fingerprint Scans captured using Optical Coherence Tomography
  13. Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
  14. Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
  15. Ivan Danov, Martin Aastrup Olsen, Christoph Busch (2014). Interpretation of fingerprint image quality features extracted by self-organizing maps
  16. Jinghua Wang, Martin Aastrup Olsen, Christoph Busch (2014). Finger image quality based on singular point localization
  17. John Ellingsgård, Ctirad Sousedik, Christoph Busch (2014). Detecting fingerprint alterations by orientation field and minutiae orientation analysis
  18. Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
  19. Marek Dusio, Martin Aastrup Olsen, Christoph Busch (2014). Fingerprint sample quality assessment via ridge line count using Laplacian of Gaussian edge finding
  20. Niclas Overgaard, Ctirad Sousedik, Christoph Busch (2014). Eulerian Video Magnification for Fingerprint Liveness Detection
  21. Carsten Gottschlich, Anna Mikaelyan, Martin Aastrup Olsen, Josef Bigun, Christoph Busch (2015). Improving Fingerprint Alteration Detection
  22. Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
  23. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
  24. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
  25. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
  26. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
  27. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
  28. Martin Aastrup Olsen, Marek Dusio, Christoph Busch (2015). Fingerprint skin moisture impact on biometric performance
  29. Martin Aastrup Olsen, Martin Böckeler, Christoph Busch (2015). Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments
  30. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
  31. Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain
  32. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
  33. Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
  34. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
  35. Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
  36. Patrick Schuch, Simon Schulz, Christoph Busch (2016). De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
  37. Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch (2017). Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
  38. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch (2017). Feature Level Fused Templates for Multi-Biometric System on Smartphones
  39. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
  40. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
  41. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
  42. Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja (2017). Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
  43. Patrick Schuch, Simon Schulz, Christoph Busch (2017). De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
  44. Patrick Schuch, Simon Schulz, Christoph Busch (2017). Deep Expectation for Estimation of Fingerprint Orientation Fields
  45. Patrick Schuch, Simon Schulz, Christoph Busch (2017). Minutia-based Enhancement of Fingerprint Samples
  46. Patrick Schuch, Simon Schulz, Christoph Busch (2017). Minutia-based Enhancement of Fingerprint Samples
  47. Patrick Schuch, Simon Schulz, Christoph Busch (2017). Survey on the impact of fingerprint image enhancement
  48. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). ConvNet Regression for Fingerprint Orientations
  49. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Deep Expectation for Estimation of Fingerprint Orientation Fields
  50. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Intrinsic Limitations of Fingerprint Orientation Estimation
  51. Patrick Schuch, Simon-Daniel Schulz, Christoph Busch (2017). Intrinsic Limitations of Fingerprint Orientation Estimation
  52. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2018). A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
  53. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch (2018). Fake Face Detection Methods: Can They Be Generalized?
  54. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2018). Biometric Transaction Authentication using Smartphones
  55. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2018). Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
  56. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch (2018). Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
  57. Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch (2018). Baseline Evaluation of Smartphone based Finger-photo Verification System
  58. Patrick Schuch, Jan Marek May, Christoph Busch (2018). Estimating the Data Origin of Fingerprint Samples
  59. Patrick Schuch, Jan Marek May, Christoph Busch (2018). Learning Neighbourhoods for Fingerprint Indexing
  60. Patrick Schuch, Jan Marek May, Christoph Busch (2018). Unsupervised Learning of Fingerprint Rotations
  61. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch (2018). Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
  62. Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja (2018). Assessing Face Image Quality with LSTMs
  63. Ali Khodabakhsh, Marius Pedersen, Christoph Busch (2019). Subjective Versus Objective Face Image Quality Evaluation For Face Recognition
  64. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2019). Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
  65. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2019). An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
  66. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch (2019). Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
  67. Ali Khodabakhsh, Christoph Busch (2020). A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
  68. Thomas Nielsen, Ali Khodabakhsh, Christoph Busch (2020). Unit-Selection Based Facial Video Manipulation Detection
  69. Ali Khodabakhsh, Christoph Busch, Raghavendra Ramachandra (2021). Automated Authentication of Audiovisual Contents: A Biometric Approach


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/geir.dyrko…

Students supervised:

  • Sergii Banin, 2016-2019: ‘Advanced Machine Learning Techniques in Malware Analysis Applications’

Publications co-authored with COINS students:

  1. Sergii Banin, Geir Olav Dyrkolbotn (2018). Multinomial malware classification via low-level features
  2. Sergii Banin, Geir Olav Dyrkolbotn (2019). Correlating High- and Low-Level Features: Increased Understanding of Malware Classification


E-mail:            [email protected]
Homepage:    http://www.kyfranke.com/

Students supervised:

  • Andrii Shalaginov, 2013-2018: ‘Application of soft computing for information security’
  • Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
  • Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
  • Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’
  • Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’
  • Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’
  • Radina Stoykova, 2017-2020: ‘Standards for digital evidence’

Publications co-authored with COINS students:

  1. Andrii Shalaginov, Katrin Franke (2013). Automatic rule-mining for malware detection employing Neuro-Fuzzy Approach
  2. Andrii Shalaginov, Katrin Franke (2015). A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications
  3. Andrii Shalaginov, Katrin Franke (2015). A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
  4. Andrii Shalaginov, Katrin Franke (2015). Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations
  5. Andrii Shalaginov, Katrin Franke (2015). Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy
  6. Andrii Shalaginov, Katrin Franke (2015). Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications
  7. Andrii Shalaginov, Katrin Franke (2016). Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps
  8. Andrii Shalaginov, Katrin Franke (2016). Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy
  9. Andrii Shalaginov, Katrin Franke, Xiongwei Huang (2016). Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
  10. Andrii Shalaginov, Lars Strande Grini, Katrin Franke (2016). Understanding Neuro-Fuzzy on a Class of Multinomial Malware Detection Problems
  11. Lars Christian Andersen, Katrin Franke, Andrii Shalaginov (2016). Data-driven Approach to Information Sharing using Data Fusion and Machine Learning for Intrusion Detection
  12. Sergii Banin, Andrii Shalaginov, Katrin Franke (2016). Memory access patterns for malware detection
  13. Andrii Shalaginov, Katrin Franke (2017). A Deep Neuro-Fuzzy method for multi-label malware classification and fuzzy rules extraction
  14. Andrii Shalaginov, Katrin Franke (2017). Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  15. Andrii Shalaginov, Jan William Johnsen, Katrin Franke (2017). Cyber Crime Investigations in the Era of Big Data
  16. Andrii Shalaginov, Katrin Franke, Jan William Johnsen (2017). IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
  17. Jan William Johnsen, Katrin Franke (2017). Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
  18. Andrii Shalaginov, Katrin Franke, Jan William Johnsen (2018). The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
  19. Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke (2018). Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
  20. Jan William Johnsen, Katrin Franke (2018). Digital Forensics Report for Dagens Næringsliv
  21. Jan William Johnsen, Katrin Franke (2018). Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
  22. Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke (2018). Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
  23. Jan William Johnsen, Katrin Franke (2019). The impact of preprocessing in natural language for open source intelligence and criminal investigation
  24. Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke (2019). Identifying Anomalous HTTP Traffic with Association Rule Mining
  25. Jan William Johnsen, Katrin Franke (2020). Identifying Proficient Cybercriminals Through Text and Network Analysis
  26. Rune Nordvik, Kyle Porter, Fergus Toolan, Stefan Axelsson, Katrin Franke (2020). Generic Metadata Time Carving


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/laura.geo…

Students supervised:

  • Adam Szekeres, 2016-2020: ‘Human motivation and the security of Internet of Things’


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/kristian.g…

Students supervised:

  • Chris Carr, 2014-2019: ‘Protection in Complex Cyber Systems’
  • Martin Strand, 2013-2017: ‘Fully homomorphic encryption’
  • Herman Galteland, 2015-2020: ‘On the usage of cryptography in malware’
  • Yao Jiang, 2016-2021: ‘Cryptographic Tools for Cloud Security’
  • Tjerand Silde, 2018-2023: ‘Post Quantum Cryptography’
  • Bor de Kock, 2018-2022: ‘Post-Quantum Key Exchanges’
  • Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
  • Shuang Wu, 2018-2022: ‘Trust and Transparency in Digital Society Through Blockchain Technology’
  • Morten Solberg, 2019-2023: ‘Secure, Usable and Robust Cryptographic Voting Systems’
  • Lise Millerjord, 2019-2024: ‘Lightweight Cryptography for Future Smart Networks’
  • Kelsey Moran, 2019-2023: ‘Future Proofing Cryptographic Voting Systems’

Publications co-authored with COINS students:

  1. Herman Galteland, Kristian Gjøsteen (2016). Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Kristian Gjøsteen (2017). Malware, Encryption, and Rerandomization – Everything is Under Attack
  3. Kristian Gjøsteen, Martin Strand (2017). A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
  4. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2018). Offline Assisted Group Key Exchange
  5. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang (2020). Fast and Secure Updatable Encryption
  6. Gareth Thomas Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang (2020). Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
  7. shuang wu, Kristian Gjøsteen, Colin Alexander Boyd (2020). A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
  8. Bor de Kock, Kristian Gjøsteen, Mattia Veroni (2021). Practical Isogeny-Based Key-Exchange with Optimal Tightness
  9. Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge (2021). Lattice-Based Proof of Shuffle and Applications to Electronic Voting
  10. Kristian Gjøsteen, Thomas Edmund Haines, Morten Rotvold Solberg (2021). Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/vasileios…

Students supervised:

  • Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’


E-mail:            [email protected]
Homepage:    http://www.item.ntnu.no/people/personalp…

Students supervised:

  • Håkon Jacobsen, 2012-2017: ‘Constructing Efficient Multivariate and Code-based Public-Key Algorithm’
  • Dijana Vukovic, 2013-2017: ‘Increasing the performance, robustness, reliability and security of web services’
  • Simona Samardjiska, 2010-2015: ‘Multivariate Public Key Algorithms Produced by Quasigroups’
  • Maria Bartnes, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’
  • Mattia Veroni, 2018-2022: ‘Post-quantum primitives’
  • Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
  • Ali Esmaeily, 2018-2022: ‘Network Slicing in 5G’

Publications co-authored with COINS students:

  1. Simona Samardjiska, Smile Markovski, Danilo Gligoroski (2010). Multivariate Quasigroups Defined by T-functions
  2. Smile Markovski, Simona Samardjiska, Danilo Gligoroski, Svein Johan Knapskog (2010). Multivariate Trapdoor Functions Based on Multivariate Left Quasigroups and Left Polynomial Quasigroups
  3. Danilo Gligoroski, Simona Samardjiska (2011). The Public Key Encryption Scheme MQQ-ENC
  4. Danilo Gligoroski, Svein Johan Knapskog, Simona Samardjiska (2011). The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies
  5. Simona Samardjiska, Danilo Gligoroski (2011). Identity-Based Identification Schemes Using Left Multivariate Quasigroups
  6. Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
  7. Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
  8. Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2011). Construction of Multivariate Quadratic Quasigroups (MQQs) in Arbitrary Galois Fields
  9. Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
  10. Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
  11. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2012). On the strong and weak keys in MQQ-SIG
  12. Simona Samardjiska, Danilo Gligoroski (2012). Left MQQs whose left parastrophe is also quadratic
  13. Simona Samardjiska, Danilo Gligoroski (2012). Towards a Secure Multivariate Identity-Based Encryption
  14. Simona Samardjiska, Danilo Gligoroski (2012). Towards a secure Multivariate Identity-Based Encryption
  15. Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2012). Algorithms for construction of multivariate quadratic quasigroups (MQQs) and their parastrophe operations in arbitrary Galois fields
  16. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
  17. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
  18. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2013). On the strong and weak keys in MQQ-SIG
  19. Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation Polynomials Over F_(2^n)
  20. Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation and Quasigroup Polynomials Over Finite Fields of Characteristic 2
  21. Simona Samardjiska, Danilo Gligoroski (2013). Towards a Characterization of Left Quasigroup Polynomials of Small Degree Over Fields of Characteristic 2
  22. Simona Samardjiska, Danilo Gligoroski (2013). Towards a secure Multivariate Identity-Based Encryption
  23. Danilo Gligoroski, Simona Samardjiska (2014). iSHAKE: Incremental Hashing With SHAKE128 and SHAKE256 for the Zettabyte Era
  24. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy (2014). CAESAR candidate PiCipher
  25. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly (2014). Pi-Cipher: Authenticated Encryption for Big Data
  26. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). Improvement Proposal for the CryptoCloak Application
  27. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). On Privacy Protection in the Internet Surveillance Era
  28. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak – Improvement Proposal Implementation
  29. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak application – main idea, an overview and improvement proposal
  30. Simona Samardjiska, Danilo Gligoroski (2014). Linearity Measures for Multivariate Public Key Cryptography
  31. Britta Hale, Christopher Alan Carr, Danilo Gligoroski (2015). CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
  32. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2015). CryptoCloak Protocol and the Prototype Application
  33. Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae (2015). A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
  34. Simona Samardjiska, Danilo Gligoroski (2015). Approaching maximum embedding efficiency on small covers using Staircase-Generator codes
  35. Britta J. Hale, Christopher Carr, Danilo Gligoroski (2016). CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control
  36. Britta Hale, Christopher Carr, Danilo Gligoroski (2017). CARIBE: Cascaded IBE for maximum flexibility and user-side control
  37. Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G
  38. Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/bjorn.a.gran

Students supervised:

  • Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’

Publications co-authored with COINS students:

  1. Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions


E-mail:            [email protected]
Homepage:    http://www.item.ntnu.no/people/personalp…

Students supervised:

  • Maria Bartnes, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’
  • Romina Muka, 2018-2021: ‘Application of New Sensors and Controllers for Distribution Grid Operation’
  • Kalpanie Mendis, 2018-2022: ‘Developing a low-latency, secure and dependable communication architecture for Microgrid protection and Control’

Publications co-authored with COINS students:

  1. Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska (2019). 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
  2. Romina Muka, Fredrik Bakkevig Haugli, Hanne Vefsnmo, Poul Einar Heegaard (2019). Information Inconsistencies in Smart Distribution Grids under Different Failure Causes modelled by Stochastic Activity Networks
  3. Marija Gajic, Marija Furdek, Poul Einar Heegaard (2020). A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery
  4. Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Vicente Casares-Giner, Frank Yong Li, Katina Kralevska (2021). Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
  5. Kashif Mehmood, Handunneththi V. Kalpanie Mendis, Katina Kralevska, Poul Einar Heegaard (2021). Intent-based Network Management and Orchestration for Smart Distribution Grids
  6. Michele Garau, Romina Muka, Poul Einar Heegaard, Bjarne Emil Helvik (2021). Co-simulation and Discrete Event Simulation for Reliability Assessment of Power System and ICT: A Comparison
  7. Romina Muka, Michele Garau, Poul Einar Heegaard (2021). Genetic algorithm for placement of IEDs for fault location in smart distribution grids
  8. Romina Muka, Michele Garau, Besmir Tola, Poul Einar Heegaard (2021). Effect of 5G communication service failure on placement of Intelligent Electronic Devices in Smart Distribution Grids


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/bjarne

Students supervised:

Publications co-authored with COINS students:

  1. Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2019). Suitability of Blockchains to Enable and Support Networking Functions: State of Art
  2. Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). An Analysis of Transaction Handling in Bitcoin
  3. Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). Effect of Miner Incentive on the Confirmation Time of Bitcoin Transactions
  4. Befekadu Gezaheng Gebraselase, Bjarne Emil Helvik, Yuming Jiang (2021). Transaction Characteristics of Bitcoin
  5. Michele Garau, Romina Muka, Poul Einar Heegaard, Bjarne Emil Helvik (2021). Co-simulation and Discrete Event Simulation for Reliability Assessment of Power System and ICT: A Comparison


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/rune.hjels…

Students supervised:

  • Shao-Fang Wen, 2015-2020: ‘Hyper Contextual Information Security Management’


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/morten.ho…

Students supervised:

  • Romina Muka, 2018-2021: ‘Application of New Sensors and Controllers for Distribution Grid Operation’


E-mail:            [email protected]
Homepage:    https://www.hslu.ch/en/lucerne-universit…

Students supervised:

  • Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/nils.kals…

Students supervised:

  • Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/sokratis….

Students supervised:

  • Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’
  • Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’
  • Ahmed Amro, 2018-2022: ‘Communication and Cybersecurity for autonomous passenger ferry’
  • Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’
  • Aida Akbarzadeh, 2019-2022: ‘Cyber-physical security of power plants within the smart grid’
  • Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’
  • Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’
  • Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’

Publications co-authored with COINS students:

  1. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas (2017). User Modeling Validation Over the Security Awareness of Digital Natives
  2. Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou (2017). Security Awareness of the Digital Natives
  3. Ahmed Walid Amro, Vasileios Gkioulos, Sokratis Katsikas (2020). Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation
  4. Aida Akbarzadeh, Sokratis Katsikas (2020). Identifying Critical Components in Large Scale Cyber Physical Systems
  5. Aida Akbarzadeh, Pankaj Pandey, Sokratis Katsikas (2020). Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
  6. Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions
  7. Ahmed Walid Amro, Vasileios Gkioulos, Sokratis Katsikas (2021). Communication architecture for autonomous passenger ship
  8. Aida Akbarzadeh, Sokratis Katsikas (2021). Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems
  9. Ahmed Walid Amro, Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas (2022). Navigation Data Anomaly Analysis and Detection
  10. Aida Akbarzadeh, Sokratis Katsikas (2022). Unified IT&OT Modeling for Cybersecurity Analysis of Cyber-Physical Systems
  11. Aybars Oruc, Vasileios Gkioulos, Sokratis Katsikas (2022). Towards a Cyber-Physical Range for the Integrated Navigation System


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/basel.katt

Students supervised:

  • Felix Schuckert, 2016-2020: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’
  • Muhammad Mudassar Yamin, 2018-2022: ‘Modelling and Analyzing Attack-Defence Scenarios for Cyber Ranges’
  • Grethe Østby, 2019-2023: ‘Societal safety in transformation – digitalization and information security awareness in civil society and civil emergency’

Publications co-authored with COINS students:

  1. Felix Schuckert, Basel Katt, Hanno Langweg (2017). Source Code Patterns of SQL Injection Vulnerabilities
  2. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox
  3. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
  4. Muhammad Mudassar Yamin, Basel Katt (2018). Detecting Malicious Windows Commands Using Natural Language Processing Techniques
  5. Muhammad Mudassar Yamin, Basel Katt (2018). Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
  6. Muhammad Mudassar Yamin, Basel Katt (2018). Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges
  7. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski (2018). Make it and Break it: An IoT Smart Home Testbed Case Study
  8. Shao-Fang Wen, Basel Katt (2018). An Ontology-Based Context Model for Managing Security Knowledge in Software Development
  9. Grethe Østby, Basel Katt (2019). Cyber Crisis Management Roles – A Municipality Responsibility Case Study
  10. Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski (2019). A Socio-Technical Framework to Improve cyber security training: A Work in Progress
  11. Muhammad Mudassar Yamin, Basel Katt (2019). A Survey of Automated Information Exchange Mechanisms Among CERTs
  12. Muhammad Mudassar Yamin, Basel Katt (2019). Cyber Security Skill Set Analysis for Common Curricula Development
  13. Muhammad Mudassar Yamin, Basel Katt (2019). Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
  14. Muhammad Mudassar Yamin, Basel Katt (2019). Mobile device management (MDM) technologies, issues and challenges
  15. Muhammad Mudassar Yamin, Basel Katt (2019). Modeling Attack and Defense Scenarios for Cyber Security Exercises
  16. Muhammad Mudassar Yamin, Basel Katt, Mazaher Kianpour (2019). Cyber Weapons Storage Mechanisms
  17. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos (2019). Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
  18. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos (2019). Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
  19. Muhammad Mudassar Yamin, Basel Katt, Kashif Sattar, Maaz Bin Ahmad (2019). Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
  20. Shao-Fang Wen, Basel Katt (2019). Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach
  21. Shao-Fang Wen, Basel Katt (2019). Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
  22. Shao-Fang Wen, Basel Katt (2019). Managing Software Security Knowledge in Context: An Ontology Based Approach
  23. Shao-Fang Wen, Basel Katt (2019). Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
  24. Shao-Fang Wen, Basel Katt (2019). Towards a Context-Based Approach for Software Security Learning
  25. Shao-Fang Wen, Mazaher Kianpour, Basel Katt (2019). Security Knowledge Management in Open Source Software Communities
  26. Ankur Shukla, Basel Katt, Livinus Obiora Nweke (2020). Vulnerability Discovery Modelling With Vulnerability Severity
  27. Felix Schuckert, Basel Katt, Hanno Langweg (2020). Difficult XSS Code Patterns for Static Code Analysis Tools
  28. Grethe Østby, Basel Katt (2020). Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
  29. Grethe Østby, Kieren N. Lovell, Basel Katt (2020). EXCON Teams in Cyber Security Training
  30. Grethe Østby, Stewart James Kowalski, Basel Katt (2020). Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
  31. Mats Seljeseth, Muhammad Mudassar Yamin, Basel Katt (2020). UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices
  32. Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt (2020). Smart Policing for a Smart World Opportunities, Challenges and Way Forward
  33. Muhammad Mudassar Yamin, Basel Katt, Espen Torseth (2021). Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study
  34. Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski (2021). Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises
  35. Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt (2021). Weaponized AI for cyber attacks
  36. Shao-Fang Wen, Muhammad Mudassar Yamin, Basel Katt (2021). Ontology-Based Scenario Modeling for Cyber Security Exercise
  37. Muhammad Mudassar Yamin, Basel Katt (2022). Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges
  38. Muhammad Mudassar Yamin, Espen Torseth, Laszlo Erdodi, Basel Katt (2022). Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study
  39. Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, Basel Katt, Mohammad Hijji, Khan Muhammad (2022). Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security


E-mail:            [email protected]
Homepage:    http://www.nislab.no/people/norwegian_in…

Students supervised:

  • Håkon Gunleifsen, 2015-2020: ‘A communication model of distributed Network Controllers in a virtualized environment (employer: Eidsiva bredbånd)’

Publications co-authored with COINS students:

  1. Thomas Kemmerich, Vivek Agrawal, Carsten Momsen (2015). Secure migration to the cloud—In and out
  2. Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization
  3. Håkon Gunleifsen, Thomas Kemmerich (2018). Security requirements for service function chaining isolation and encryption
  4. Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich (2018). A Tiered Control Plane Model for Service Function Chaining Isolation
  5. Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos (2019). A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
  6. Håkon Gunleifsen, Thomas Kemmerich, Vasileios Gkioulos (2019). Dynamic setup of IPsec VPNs in service function chaining


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/vlado.kitano…

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/stewart.kowa…

Students supervised:

  • Shao-Fang Wen, 2015-2020: ‘Hyper Contextual Information Security Management’
  • Mazaher Kianpour, 2018-2022: ‘Information Security Economics’
  • Grethe Østby, 2019-2023: ‘Societal safety in transformation – digitalization and information security awareness in civil society and civil emergency’

Publications co-authored with COINS students:

  1. Shao-Fang Wen, Stewart James Kowalski (2017). A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
  2. Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski (2018). Make it and Break it: An IoT Smart Home Testbed Case Study
  3. Grethe Østby, Lars Berg, Mazaher Kianpour, Basel Katt, Stewart James Kowalski (2019). A Socio-Technical Framework to Improve cyber security training: A Work in Progress
  4. Shao-Fang Wen, Mazaher Kianpour, Stewart James Kowalski (2019). An Empirical Study of Security Culture in Open Source Software Communities
  5. Grethe Østby, Stewart James Kowalski (2020). Preparing for cyber crisis management exercises
  6. Grethe Østby, Stewart James Kowalski, Basel Katt (2020). Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
  7. Grethe Østby, Stewart James Kowalski (2021). A case study of a municipality phishing attack measures – towards a socio-technical incident management framework
  8. Grethe Østby, Stewart James Kowalski (2022). Introducing Serious Games as a Master Course in Information Security Management Programs: Moving Towards Socio-Technical Incident Response Learning


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/kraemer

Students supervised:

  • Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’

Publications co-authored with COINS students:

  1. Stanislav Lange, Susanna Schwarzmann, Marija Gajic, Thomas Zinner, Frank Alexander Kraemer (2021). AI in 5G Networks: Challenges and Use Cases


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/katinak

Students supervised:

  • Mayank Raikwar, 2019-2022: ‘Innovative Cryptography for Innovative Blockchain Services’
  • Ali Esmaeily, 2018-2022: ‘Network Slicing in 5G’

Publications co-authored with COINS students:

  1. Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Katina Kralevska (2019). 5G Network Slicing as an Enabler for Smart Distribution Grid Operations
  2. Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G
  3. Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski (2020). 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
  4. Ali Esmaeily, Katina Kralevska (2021). Small-Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review
  5. Handunneththi V. Kalpanie Mendis, Poul Einar Heegaard, Vicente Casares-Giner, Frank Yong Li, Katina Kralevska (2021). Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
  6. Kashif Mehmood, Handunneththi V. Kalpanie Mendis, Katina Kralevska, Poul Einar Heegaard (2021). Intent-based Network Management and Orchestration for Smart Distribution Grids


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/okure

Students supervised:

  • Desta Haileselassie Hagos, 2015-2020: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’


E-mail:            [email protected]
Homepage:    http://www.hanno-langweg.de/hanno/

Students supervised:

  • Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
  • Felix Schuckert, 2016-2020: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’

Publications co-authored with COINS students:

  1. Hanno Langweg, Lisa Rajbhandari (2012). Flexible Regulation with Privacy Points
  2. Yi-Ching Liao, Hanno Langweg (2013). A Survey of Process Activity Tracking Systems
  3. Rune Nordvik, Yi-Ching Liao, Hanno Langweg (2014). AccountabilityFS: A File System Monitor for Forensic Readiness
  4. Yi-Ching Liao, Hanno Langweg (2014). Cost-benefit analysis of kernel tracing systems for forensic readiness
  5. Yi-Ching Liao, Hanno Langweg (2014). Process Tracking for Forensic Readiness
  6. Yi-Ching Liao, Hanno Langweg (2014). Resource-Based Event Reconstruction of Digital Crime Scenes
  7. Yi-Ching Liao, Hanno Langweg (2015). Developing Metrics for Surveillance Impact Assessment
  8. Yi-Ching Liao, Hanno Langweg (2015). Events and causal factors charting of kernel traces for root cause analysis
  9. Yi-Ching Liao, Hanno Langweg (2016). Evidential Reasoning for Forensic Readiness
  10. Felix Schuckert, Basel Katt, Hanno Langweg (2017). Source Code Patterns of SQL Injection Vulnerabilities
  11. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox
  12. Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg (2018). Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
  13. Felix Schuckert, Basel Katt, Hanno Langweg (2020). Difficult XSS Code Patterns for Static Code Analysis Tools


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/jingyue.l…

Students supervised:

  • Eivind Kristoffersen, 2017-2021: ‘CIRCit (employer: Sopra Steria)’
  • Jin Zhang, 2017-2021: ‘Integrated safety and security analysis of cyber-physical systems using system engineering approach’
  • Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’

Publications co-authored with COINS students:

  1. Jingyue Li, Jin Zhang, Nektaria Kaloudi (2018). Could We Issue Driving Licenses to Autonomous Vehicles?
  2. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for cybersecurity requirements
  3. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for security
  4. Jin Zhang, Jingyue Li (2020). Testing and verification of neural-network-based safety-critical control software: A systematic literature review
  5. Nektaria Kaloudi, Jingyue Li (2020). The AI-based cyber threat landscape: A survey
  6. J. Robert Taylor, Jin Zhang, Igor Kozine, Jingyue Li (2021). Safety and Security Analysis for Autonomous Vehicles
  7. Jin Zhang, J. Robert Taylor, Igor Kozine, Jingyue Li (2021). Analyzing Influence of Robustness of Neural Networks on the Safety of Autonomous Vehicles
  8. Jin Zhang, Taylor J.Robert, Kozine Igor, Jingyue Li (2021). Analyzing Influence of Robustness of Neural Networks on the Safety of AutonomousVehicles
  9. Nektaria Kaloudi, Jingyue Li (2021). Comparison of Risk Analysis Approaches for Analyzing Emergent Misbehavior in Autonomous Systems
  10. Torstein Meyer, Nektaria Kaloudi, Jingyue Li (2021). A Systematic Literature Review on Malicious Use of Reinforcement Learning


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/mary.a.lundt…

Students supervised:

  • Balint Teglasy, 2019-2022: ‘ICT Security in Safety Instrumented Systems as applied in critical infrastructures’

Publications co-authored with COINS students:

  1. Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen (2020). Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/sfm

Students supervised:

  • Sonu Jha, 2019-2023: ‘Lightweight Cryptography for Future Smart Networks’

Publications co-authored with COINS students:

  1. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
  2. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  3. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  4. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
  5. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid (2016). Attacks on cMix – Some Small Overlooked Details
  6. Charlotte S. Rikardsen, Britta Hale, Stig Frode Mjølsnes (2017). User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps
  7. Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid (2017). Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking


E-mail:            [email protected]
Homepage:    http://www.ii.uib.no/~khalid/

Students supervised:

  • Samson Gejibo, 2011-2015: ‘Security Aspects of Mobile Health system’

Publications co-authored with COINS students:

  1. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Jørn Ivar Klungsøyr (2011). Adding Security to Mobile Data Collection
  2. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Java ME-Based Mobile Data Collection Systems
  3. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Mobile Data Collection Systems
  4. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Mobile Data Collection Systems for Low-Budget Settings
  5. Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
  6. Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
  7. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Daniele Grasso (2013). Secure cloud storage for remote mobile data collection
  8. Samson Hussien Gejibo, Khalid Azim Mughal (2015). Towards a Secure Framework for mHealth. A Case Study in Mobile Data Collection Systems


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/mariusz.no…

Students supervised:

  • Abylay Satybaldy, 2019-2022: ‘Rights and Identity on Blockchains, Trust and Transparency in Digital Society Through Blockchain Technology’

Publications co-authored with COINS students:

  1. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski (2017). Digital forensic implications of collusion attacks on the lightning network
  2. Dmytro Piatkivskyi, Mariusz Nowostawski (2018). Split payments in payment networks
  3. Muhammad Mudassar Yamin, Basel Katt, Mariusz Nowostawski (2021). Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/runar.ostnes

Students supervised:

  • Aybars Oruc, 2020-2023: ‘Cybersecurity of the Integrated Bridge System (IBS) on Conventional Vessels’


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/jiaxin.pan

Students supervised:

  • Magnus Ringerud, 2019-2023: ‘Formal treatment of practical signature schemes’


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/marius.peder…

Students supervised:

Publications co-authored with COINS students:

  1. Ali Khodabakhsh, Marius Pedersen, Christoph Busch (2019). Subjective Versus Objective Face Image Quality Evaluation For Face Recognition


E-mail:            [email protected]
Homepage:    http://www.ansatt.hig.no/slobodanp/

Students supervised:

  • Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
  • Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’
  • Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’
  • Georgios Kavallieratos, 2018-2021: ‘Security of the Cyber-Enabled ship’

Publications co-authored with COINS students:

  1. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  2. Ambika Shrestha Chitrakar, Slobodan Petrovic (2015). Approximate search with constraints on indels with application in SPAM filtering
  3. Ambika Shrestha Chitrakar, Slobodan Petrovic (2016). Constrained Row-Based Bit-Parallel Search in Intrusion Detection
  4. Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization
  5. Ambika Shrestha Chitrakar, Slobodan Petrovic (2017). CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns
  6. Kyle Porter, Slobodan Petrovic (2017). On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
  7. Kyle Porter, Slobodan Petrovic (2017). On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
  8. Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark
  9. Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Collecting Network Evidence Using Constrained Approximate Search Algorithms
  10. Ambika Shrestha Chitrakar, Slobodan Petrovic (2018). Parallel k means clustering with triangle inequality on Spark
  11. Kyle Porter, Slobodan Petrovic (2018). Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora
  12. Kyle Porter, Slobodan Petrovic (2018). Obtaining precision-recall trade-offs in fuzzy searches of large email corpora
  13. Ambika Shrestha Chitrakar, Slobodan Petrovic (2019). Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/raghavendr…

Students supervised:

  • Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
  • Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
  • Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’
  • Hareesh Mandalapu, 2017-2020: ‘Presentation Attack Detection in Iris and Ocular biometrics’
  • Jag Mohan Singh, 2018-2021: ‘Robust Biometric Authentication using 3D Information’

Publications co-authored with COINS students:

  1. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  2. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  3. Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
  4. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
  5. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
  6. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
  7. Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
  8. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
  9. Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
  10. Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch (2017). Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
  11. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch (2017). Feature Level Fused Templates for Multi-Biometric System on Smartphones
  12. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
  13. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
  14. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
  15. Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja (2017). Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
  16. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2018). A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
  17. Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch (2018). Fake Face Detection Methods: Can They Be Generalized?
  18. Jag Mohan Singh, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra (2018). Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU
  19. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2018). Biometric Transaction Authentication using Smartphones
  20. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2018). Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
  21. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch (2018). Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
  22. Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch (2018). Baseline Evaluation of Smartphone based Finger-photo Verification System
  23. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch (2018). Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
  24. Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja (2018). Assessing Face Image Quality with LSTMs
  25. Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch (2019). Subjective Evaluation of Media Consumer Vulnerability to Fake Audiovisual Content
  26. Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch (2019). An Empirical Evaluation of Deep Architectures on Generalization of Smartphone-based Face Image Quality Assessment
  27. Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Sushil Bhattacharjee, Pankaj Shivdayal Wasnik, Sebastien Marcel, Christoph Busch (2019). Custom Silicone Face Masks: Vulnerability of Commercial Face Recognition Systems and Presentation Attack Detection
  28. Ali Khodabakhsh, Christoph Busch, Raghavendra Ramachandra (2021). Automated Authentication of Audiovisual Contents: A Biometric Approach


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/guttorm.sind…

Students supervised:

  • Per Håkon Meland, 2016-2020: ‘Modelling of cyber attacks and economic incentives (employer: SINTEF)’

Publications co-authored with COINS students:

  1. Yara Bayoumy, Per Håkon Meland, Guttorm Sindre (2018). A Netnographic Study on the Dark Net Ecosystem for Ransomware
  2. Bent Johansen, Guttorm Sindre, Per Håkon Meland (2019). You Don’t Know CryptoJack
  3. Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre (2019). An experimental analysis of cryptojacking attacks
  4. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for cybersecurity requirements
  5. Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre (2019). An experimental evaluation of bow-tie analysis for security
  6. Kristian Haga, Per Håkon Meland, Guttorm Sindre (2020). Breaking the Cyber Kill Chain by Modelling Resource Costs
  7. Per Håkon Meland, Guttorm Sindre (2020). Cyber Attacks for Sale
  8. Per Håkon Meland, Yara Bayoumy, Guttorm Sindre (2020). The Ransomware-as-a-Service economy within the darknet


E-mail:            [email protected]
Homepage:    https://www.ansatt.hig.no/einars/

Students supervised:

  • Lisa Rajbhandari, 2010-2013: ‘Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk’
  • Kashif Habib Sheikh, 2012-2018: ‘Risk-based adaptive security for internet of things in eHealth (employer: NR)’
  • Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’
  • Pankaj Pandey, 2012-2016: ‘Using Theories from Economics and Finance to Address Information Security Risk Management’
  • Waqas Aman, 2012-2016: ‘Context Aware Risk Analysis for Adaptive Security in Internet of Things’
  • Gaute Wangen, 2013-2017: ‘Conflicting Incentives Risk Analysis’
  • Vivek Agrawal, 2014-2018: ‘Cloud Based Conflicting Incentives risk analysis’
  • Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
  • Adam Szekeres, 2016-2020: ‘Human motivation and the security of Internet of Things’

Publications co-authored with COINS students:

  1. Lisa Rajbhandari, Einar Snekkenes (2011). An Approach to Measure Effectiveness of Control for Risk Analysis with Game Theory
  2. Lisa Rajbhandari, Einar Snekkenes (2011). Mapping between Classical Risk Management and Game Theoretical Approaches
  3. Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
  4. Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
  5. Lisa Rajbhandari, Einar Snekkenes (2012). Intended Actions: Risk Is Conflicting Incentives
  6. Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems
  7. Gaute Wangen, Einar Snekkenes (2013). A Taxonomy of Challenges in Information Security Risk Management
  8. Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Research and Training
  9. Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Risk Analysis Research and Training
  10. Lisa Rajbhandari, Einar Snekkenes (2013). Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
  11. Lisa Rajbhandari, Einar Snekkenes (2013). Using the Conflicting Incentives Risk Analysis Method
  12. Pankaj Pandey, Einar Snekkenes (2013). A Framework for Comparison and Analysis of Information Security Investment Models
  13. Waqas Aman, Einar Snekkenes (2013). An Empirical Research on InfoSec Risk Management in IoT-based eHealth
  14. Gaute Wangen, Einar Snekkenes (2014). A Comparison between Business Process Management and Information Security Management
  15. Pankaj Pandey, Einar Snekkenes (2014). An Assessment of Market Methods for Information Security Risk Management
  16. Pankaj Pandey, Einar Snekkenes (2014). Applicability of Prediction Markets in Information Security Risk Management
  17. Pankaj Pandey, Einar Snekkenes (2014). Using Prediction Markets to Hedge Information Security Risks
  18. Pankaj Pandey, Einar Snekkenes (2014). Using prediction markets to hedge information security risks
  19. Waqas Aman, Einar Snekkenes (2014). Event Driven Adaptive Security in Internet of Things
  20. Pankaj Pandey, Einar Snekkenes (2015). A Performance Assessment Metric for Information Security Financial Instruments
  21. Pankaj Pandey, Einar Snekkenes (2015). Design and Performance Aspects of Information Security Prediction Markets for Risk Management
  22. Waqas Aman, Einar Snekkenes (2015). EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
  23. Waqas Aman, Einar Snekkenes (2015). Managing Security Trade-offs in the Internet of Things using Adaptive Security
  24. Pankaj Pandey, Einar Snekkenes (2016). Using Financial Instruments to Transfer the Information Security Risks
  25. Vivek Agrawal, Einar Arthur Snekkenes (2017). An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  26. Vivek Agrawal, Einar Arthur Snekkenes (2017). An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  27. Vivek Agrawal, Einar Arthur Snekkenes (2017). Creating a successful Communities of practice
  28. Vivek Agrawal, Einar Arthur Snekkenes (2017). Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  29. Vivek Agrawal, Einar Arthur Snekkenes (2017). Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  30. Vivek Agrawal, Einar Arthur Snekkenes (2017). UnRizkNow: A community of practice for information security risk practitioners
  31. Vivek Agrawal, Einar Arthur Snekkenes (2017). UnRizkNow: An open electronic community of practice for information security professionals
  32. Vivek Agrawal, Einar Arthur Snekkenes (2017). Utfordringer og muligheter for deling av informasjon innen Cyber Security
  33. Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes (2017). Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
  34. Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes (2017). Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
  35. Adam Szekeres, Einar Arthur Snekkenes (2018). Unobtrusive Psychological Profiling for Risk Analysis
  36. Kashif Habib, Wolfgang Leister, Einar Arthur Snekkenes, Ilangko Balasingham (2018). Context-Aware Adaptive Authentication for the IoT in eHealth
  37. Vivek Agrawal, Einar Arthur Snekkenes (2018). Secure Benchmarking using Electronic Voting
  38. Adam Szekeres, Einar Arthur Snekkenes (2019). A Taxonomy of Situations within the Context of Risk Analysis
  39. Adam Szekeres, Einar Arthur Snekkenes (2019). Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
  40. Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes (2019). Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation
  41. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
  42. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
  43. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational measures for effective profiling of healthcare staffs? security practices
  44. Adam Szekeres, Einar Arthur Snekkenes (2020). Construction of Human Motivational Profiles by Observation for Risk Analysis
  45. Adam Szekeres, Einar Arthur Snekkenes (2020). Representing decision-makers in SGAM-H: the Smart Grid Architecture Model Extended with the Human Layer
  46. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes (2020). Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  47. Prosper Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study
  48. Prosper Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes (2021). Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/norvald.s…

Students supervised:


E-mail:            [email protected]
Homepage:    http://www.math.ntnu.no/~tyssedal/

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’

Publications co-authored with COINS students:

  1. Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation
  2. Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation


E-mail:            [email protected]
Homepage:    http://www.ntnu.edu/employees/thomas.wal…

Students supervised:

  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’


E-mail:            [email protected]
Homepage:    http://www.haowang.no/

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/otto.witt…

Students supervised:

  • Marija Gajic, 2017-2022: ‘Policy – based network applications and service configuration’


E-mail:            [email protected]
Homepage:    http://www.wolthusen.com/

Students supervised:

  • Goitom Weldehawaryat, 2011-2017: ‘Resilient Consensus, Interdependencies, and Optimisation in Sparse Networks’
  • Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’
  • Livinus Obiora Nweke, 2019-2022: ‘Understanding the Resilience of Software Defined Networking for Industrial Control Networks’

Publications co-authored with COINS students:

  1. Goitom Weldehawaryat, Stephen Wolthusen (2013). Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs
  2. Goitom Weldehawaryat, Stephen Wolthusen (2014). Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence
  3. Goitom Weldehawaryat, Stephen Wolthusen (2015). Modelling Interdependencies over Incomplete Join Structures of Power Law Networks
  4. Goitom Weldehawaryat, Stephen Wolthusen (2015). Secure distributed demand projection in micro-grids
  5. Vasileios Gkioulos, Stephen Wolthusen (2015). Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks
  6. Vasileios Gkioulos, Stephen Wolthusen (2016). Efficient security policy reconciliation in tactical service oriented architectures
  7. Vasileios Gkioulos, Stephen D. Wolthusen (2016). Securing Tactical Service Oriented Architectures
  8. Vasileios Gkioulos, Stephen Wolthusen, Athanasios Iossifides (2016). A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
  9. Vasileios Gkioulos, Stephen Wolthusen, Adam Flizikowski, Anna Stachowicz, Dariusz Nogalski, Kamil Gleba, Joanna Sliwa (2016). Interoperability of security and quality of Service Policies Over Tactical SOA
  10. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem (2017). Decentralised scheduling of power consumption in micro-grids: Optimisation and security
  11. Vasileios Gkioulos, Stephen Wolthusen (2017). A Security Policy Infrastructure for Tactical Service Oriented Architectures
  12. Vasileios Gkioulos, Stephen Wolthusen (2017). Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
  13. Vasileios Gkioulos, Stephen Wolthusen (2017). Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  14. Vasileios Gkioulos, Stephen Wolthusen (2017). Security Requirements for the Deployment of Services Across Tactical SOA
  15. Vasileios Gkioulos, Erko Risthein, Stephen Wolthusen (2017). TACTICS: Validation of the security framework developed for tactical SOA
  16. Livinus Obiora Nweke, Stephen Wolthusen, Luigi V. Mancini (2019). A Framework for the Validation of Network Artifacts
  17. Livinus Obiora Nweke, Stephen Wolthusen (2020). A Review of Asset-Centric Threat Modelling Approaches
  18. Livinus Obiora Nweke, Stephen Wolthusen (2020). Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
  19. Livinus Obiora Nweke, Stephen Wolthusen (2020). Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
  20. Livinus Obiora Nweke, Stephen Wolthusen (2020). Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
  21. Livinus Obiora Nweke, Stephen Wolthusen (2020). Resilience Analysis of Software-Defined Networks Using Queueing Networks
  22. Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Wolthusen (2020). Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
  23. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang (2020). Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
  24. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
  25. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Legal requirements toward enhancing the security of medical devices
  26. Livinus Obiora Nweke, Stephen Wolthusen (2021). A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda
  27. Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen (2021). Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus
  28. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2021). Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring
  29. Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Dirk Bjørn Wolthusen (2022). Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466))


E-mail:            [email protected]
Homepage:    https://sites.google.com/site/bianyangsi…

Students supervised:

  • Edlira Martiri, 2012-2020: ‘Template protection for multi-biometrics (employer: University of Tirana)’
  • Guoqiang Li, 2012-2016: ‘Biometric indexing’
  • Prosper Yeng, 2019-2022: ‘Healthcare Security Practice Analysis, Modeling and Incentivization’
  • Muhammad Ali Fauzi, 2019-2022: ‘Modelling Healthcare Staffs’ Mental State to Minimize Cybersecurity Risk’

Publications co-authored with COINS students:

  1. Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
  2. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  3. Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
  4. Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
  5. Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
  6. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
  7. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  8. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  9. Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
  10. Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
  11. Bian Yang, Edlira Nepravishta Martiri (2015). Using Honey Templates to Augment Hash Based Biometric Template Protection
  12. Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
  13. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
  14. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
  15. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
  16. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
  17. Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain
  18. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Healthcare Staffs’ Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
  19. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational Measures for Effective Profiling of Healthcare Staffs’ Security Practices
  20. Prosper Yeng, Bian Yang, Einar Arthur Snekkenes (2019). Observational measures for effective profiling of healthcare staffs? security practices
  21. Prosper Yeng, Peter Nimbe, Benjamin Asubam Weyori, Terje Solvoll, Bian Yang (2019). Web Vulnerability Measures for SMEs
  22. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang (2020). Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
  23. Muhammad Ali Fauzi, Bian Yang (2020). Audiouth: Multi-factor Authentication Based on Audio Signal
  24. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN Based Honeywords System for Machine-Generated Passwords Database
  25. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies
  26. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). PassGAN-Based Honeywords System
  27. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri (2020). Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness
  28. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2020). Comparative analysis of machine learning methods for analyzing security practice in electronic health records’ logs.
  29. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2020). Workflow-based anomaly detection using machine learning on electronic health records’ logs: A Comparative Study
  30. Prosper Yeng, Stephen D. Wolthusen, Bian Yang (2020). Comparative analysis of software development methodologies for security requirement analysis: Towards healthcare security practice
  31. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
  32. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2020). Legal requirements toward enhancing the security of medical devices
  33. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes (2020). Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  34. Muhammad Ali Fauzi, Bian Yang (2021). Continuous Stress Detection of Hospital Staff Using Smartwatch Sensors and Classifier Ensemble
  35. Muhammad Ali Fauzi, Prosper Yeng, Bian Yang, Dita Rachmayani (2021). Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia
  36. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang (2021). Assessing the effect of human factors in healthcare cyber security practice: An empirical study
  37. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang (2021). Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring
  38. Prosper Yeng, Adam Szekeres, Bian Yang, Einar Arthur Snekkenes (2021). Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study
  39. Prosper Yeng, Livinus Obiora Nweke, Bian Yang, Muhammad Ali Fauzi, Einar Arthur Snekkenes (2021). Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study


E-mail:            [email protected]
Homepage:    https://www.ntnu.no/ansatte/sule.yildiri…

Students supervised:

  • Doney Abraham, 2020-2023: ‘Cybersecurity of IoT enabled Smart Grids’
  • Sarang Shaikh, 2021-2024: ‘PhD candidate in modelling and simulation of social impact and acceptability of modern border control technologies’

Publications co-authored with COINS students:

  1. Ogerta Elezaj, Sule Yildirim Yayilgan, Mohamed Ali Saleh Abomhara, Prosper Yeng, Javed Ahmed (2019). Data-driven Intrusion Detection System for Small and Medium Enterprises
  2. Mohamed Abomhara, Sule Yildirim Yayilgan, Livinus Obiora Nweke, Zoltán Székely (2021). A comparison of primary stakeholders views on the deployment of biometrics technology in border management: Case study of smart mobility at the European land borders
  3. Doney Abraham, Sule Yildirim Yayilgan, Mohamed Abomhara, Alemayehu Gebremedhin, Fisnik Dalipi (2022). Security and Privacy issues in IoT based Smart Grids: A case study in a digital substation
  4. Filip Holik, Doney Abraham, Sule Yildirim Yayilgan (2022). Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations
  5. Livinus Obiora Nweke, Mohamed Abomhara, Sule Yildirim Yayilgan, Debora Camparin, Olivier Heurtier, Calum Bunney (2022). A LINDDUN-Based Privacy Threat Modelling for National Identification Systems
  6. Sule Yildirim Yayilgan, Filip Holik, Mohamed Abomhara, Doney Abraham, Alemayehu Gebremedhin (2022). A Comprehensive Methodology for Analyzing Cyber Security Threats and Attacks in IoT based Power Networks: A Case Study of Digital Substation in Norway (PUBLICATION IS UNDER REVIEW)


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/haraldov

Students supervised:

University of Agder


E-mail:            [email protected]
Homepage:    http://www.uia.no/kk/profil/geirk

Students supervised:

Publications co-authored with COINS students:

  1. Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
  2. Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
  3. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2014). Security and Privacy in the Internet of Things: Current Status and Open Issues
  4. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
  5. Mohamed Ali Saleh Abomhara, Martin Gerdes, Geir Myrdahl Køien (2015). A STRIDE-Based Threat Model for Telehealth Systems
  6. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2016). Towards an Access Control Model for Collaborative Healthcare Systems
  7. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien (2016). Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
  8. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg (2017). Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification
  9. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes (2018). Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  10. Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes (2018). Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
  11. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid (2018). Towards Risk-aware Access Control Framework for Healthcare Information Sharing


E-mail:            [email protected]
Homepage:    http://www.uia.no/en/div/project/systems…

Students supervised:

  • Nils Ulltveit-Moe, 2009-2014: ‘Privacy Enhanced Network Monitoring’
  • Huihui Yang, 2012-2016: ‘Privacy Policies for Online Services’
  • Berglind Smaradottir, 2010-2016: ‘Usability evaluation and security management of health care information systems’
  • Joseph Twayigira, 2013-2017: ‘Using Mobile Cloud Computing for Crisis and Emergency Management: Securty and Privacy Aspects (employer: University of Rwanda)’
  • Harsha Sandaruwan Gardiyawasam Pussewalage, 2015-2019: ‘Attribute based Methods to Enforce Security and Privacy in E-health Solutions’

Publications co-authored with COINS students:

  1. Vladimir Oleshchuk, Nils Ulltveit-Moe (2009). Two Tiered Privacy Enhanced Intrusion Detection System Architecture
  2. Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). PRIvacy LEakage Methodology (PRILE) for IDS Rules
  3. Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). Privacy Violation Classification of Snort Ruleset
  4. Vladimir Oleshchuk, Nils Ulltveit-Moe (2010). PRIvacy LEakage Methodology (PRILE) for IDS rules
  5. Nils Ulltveit-Moe, Vladimir Oleshchuk (2011). A Composite Privacy Leakage Indicator
  6. Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
  7. Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Decision-cache based XACML authorisation and anonymisation for XML documents
  8. Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Mobile Security with Location-Aware Role-Based Access Control
  9. Nils Ulltveit-Moe, Vladimir Oleshchuk (2013). Measuring privacy leakage for IDS rules
  10. Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
  11. Huihui Yang, Vladimir Oleshchuk (2014). An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
  12. Huihui Yang, Jiao Lei, Vladimir Oleshchuk (2014). A General Framework for Group Authentication and Key Exchange Protocols
  13. Joseph Twayigira, Vladimir Oleshchuk (2014). User authentication in mobile cloud-based crisis and emergency management
  14. Huihui Yang, Vladimir Oleshchuk (2015). A dynamic attribute-based authentication scheme
  15. Huihui Yang, Vladimir Oleshchuk (2015). ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
  16. Huihui Yang, Vladimir Oleshchuk (2015). An efficient traceable attribute-based authentication scheme with one-time attribute trees
  17. Huihui Yang, Vladimir Oleshchuk (2015). Traceable hierarchical attribute-based authentication for the cloud
  18. Berglind Smaradottir, Rune Werner Fensli, Vladimir Oleshchuk (2016). User-centred Design and Evaluation of Health Information Technology : Doctoral Dissertation for the Degree Philosophiae Doctor (PhD) in Information and Communication Technology
  19. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
  20. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). An attribute based access control scheme for secure sharing of electronic health records
  21. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
  22. Harsha Gardiyawasam Pussewalage, Pasika Ranaweera, Vladimir Oleshchuk, Indika A.M. Balapuwaduge (2016). Secure Multi-party based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data
  23. Huihui Yang, Andreas Prinz, Vladimir Oleshchuk (2016). Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
  24. Huihui Yang, Vladimir Oleshchuk, Andreas Prinz (2016). Verifying group authentication protocols by Scyther
  25. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
  26. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment
  27. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). Attribute based access control scheme with controlled access delegation for collaborative E-health environments
  28. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2018). Blockchain Based Delegatable Access Control Scheme for a Collaborative E-health Environment
  29. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid (2018). Towards Risk-aware Access Control Framework for Healthcare Information Sharing
  30. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2019). An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

University of Bergen


E-mail:            [email protected]
Homepage:    http://www.uib.no/personer/Lilya.Budaghy…

Students supervised:

  • Bo Sun, 2013-2018: ‘Cloud Computing Security’
  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
  • Irene Villa, 2016-2021: ‘Optimal Boolean Functions’
  • Nikolay Kaleyski, 2017-2021: ‘Properties of optimal Boolean functions’
  • Diana Davidova, 2017-2021: ‘Construction and properties of cryptographic Boolean functions’

Publications co-authored with COINS students:

  1. Lilya Budaghyan, Oleksandr Kazymyrov (2012). Verification of Restricted EA-Equivalence for Vectorial Boolean Functions
  2. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
  3. Bo Sun, Lilya Budaghyan (2018). On Classification and Some Properties of APN Functions
  4. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions
  5. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stanica (2018). Partially APN Boolean functions
  6. Lilya Budaghyan, Marco Calderini, Irene Villa (2019). On relations between CCZ- and EA-equivalences
  7. Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert Coulter, Irene Villa (2019). On Isotopic Shift Construction for Planar Functions
  8. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stănică (2019). Partially APN Boolean functions and classes of functions that are not APN infinitely often
  9. Lilya Budaghyan, Marco Calderini, Irene Villa (2020). On equivalence between known families of quadratic APN functions
  10. Lilya Budaghyan, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). A New Family of APN Quadrinomials
  11. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). On the Distance Between APN Functions
  12. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stanica (2020). On the sensitivity of some permutation APN functions to swapping points
  13. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stănică (2020). Partially APN functions with APN-like polynomial representations
  14. Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa (2020). Constructing APN functions through isotopic shifts
  15. Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa (2020). Generalized isotopic shift construction for APN functions
  16. Yuyin Yu, Nikolay Stoyanov Kaleyski, Lilya Budaghyan, Yongqiang Li (2020). Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9
  17. Diana Davidova, Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila (2021). Relation between o-equivalence and EA-equivalence for Niho bent functions
  18. Lilya Budaghyan, Nikolay Stoyanov Kaleyski (2021). Towards a deeper understanding of APN functions and related longstanding problems
  19. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stanica (2021). On the behavior of some APN permutations under swapping points


E-mail:            [email protected]
Homepage:    https://www.ii.uib.no/~magne/

Students supervised:

  • Benjamin Chetioui, 2017-2022: ‘Building High-Integrity Software using Property-Based Testing’

Publications co-authored with COINS students:

  1. Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià (2019). Finite difference methods fengshui: alignment through a mathematics of arrays
  2. Benjamin Chetioui, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Järvi, Lenore Mullin (2021). Padding in the Mathematics of Arrays
  3. Benjamin Chtioui Richard Chetioui, Mikhail Barash, Magne Haveraaen (2021). An Ecosystem Architecture for the Magnolia Programming Language


E-mail:            [email protected]
Homepage:    http://www.ii.uib.no/~torh/

Students supervised:

  • Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
  • Chunlei Li, 2010-2014: ‘Secure Boolean Functions for Coding and Cryptography’
  • Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Navid Ghaedi Bardeh, 2016-2019: ‘Cryptanalysis of Symmetric Cryptographic Primitives’
  • Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’

Publications co-authored with COINS students:

  1. Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
  2. Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
  3. Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
  4. Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
  5. Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher
  6. Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
  7. Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
  8. Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
  9. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
  10. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
  11. Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
  12. Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
  13. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
  14. Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth (2017). Yoyo tricks with AES
  15. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions
  16. Lilya Budaghyan, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). A New Family of APN Quadrinomials
  17. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nikolay Stoyanov Kaleyski (2020). On the Distance Between APN Functions
  18. Diana Davidova, Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila (2021). Relation between o-equivalence and EA-equivalence for Niho bent functions


E-mail:            [email protected]
Homepage:    http://www.uib.no/persons/kjellh

Students supervised:

  • Tetiana Yarygina, 2013-2018: ‘Robust and secure cloud services’
  • Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’

Publications co-authored with COINS students:

  1. Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
  2. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations


E-mail:            [email protected]
Homepage:    https://www.ii.uib.no/~jjarvi/

Students supervised:

  • Benjamin Chetioui, 2017-2022: ‘Building High-Integrity Software using Property-Based Testing’

Publications co-authored with COINS students:

  1. Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi (2018). Exploring Microservice Security
  2. Benjamin Chetioui, Lenore Mullin, Ole Jørgen Abusdal, Magne Haveraaen, Jaakko Timo Henrik Järvi, Sandra Macià (2019). Finite difference methods fengshui: alignment through a mathematics of arrays


E-mail:            [email protected]
Homepage:    http://www.uib.no/persons/Alexander.Khol…

Students supervised:

  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’

Publications co-authored with COINS students:

  1. Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher


E-mail:            [email protected]
Homepage:    https://www.researchgate.net/profile/Nia…

Students supervised:

  • Bo Sun, 2013-2018: ‘Cloud Computing Security’

Publications co-authored with COINS students:

  1. Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
  2. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
  3. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
  4. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions
  5. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun (2018). On Upper Bounds for Algebraic Degrees of APN Functions


E-mail:            [email protected]
Homepage:    http://www.ii.uib.no/~federico/

Students supervised:


E-mail:            [email protected]
Homepage:    http://ii.uib.no/~matthew/

Students supervised:

  • Dan Zhang, 2017-2021: ‘Self-dual quantum codes’
  • Sachin Valera, 2016-2019: ‘Quantum Machine Learning’

Publications co-authored with COINS students:

  1. Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III


E-mail:            [email protected]
Homepage:    http://www.uib.no/info/dr_grad/2005/Radd…

Students supervised:

  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Srimathi Varadharajan, 2015-2020: ‘Application of BDD to Cryptography’
  • John Petter Indrøy, 2018-2021: ‘Application of Compressed Right Hand Sides on AES (employer: Simula UiB)’
  • Martha Norberg Hovd, 2018-2022: ‘Security of Homomorphic Encryption’
  • Morten Øygarden, 2018-2021: ‘Quantum Safe Cryptography’

Publications co-authored with COINS students:

  1. Mithilesh Kumar, Håvard Raddum, Srimathi Varadharajan (2019). Reducing lattice enumeration search trees
  2. Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum (2021). A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem
  3. Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum (2022). On the IND-CCA1 Security of FHE Schemes


E-mail:            [email protected]
Homepage:    http://www.uib.no/en/persons/Eirik.Rosne…

Students supervised:

  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
  • Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’
  • Reent Schlegel, 2018-2021: ‘Private Edge Computing (employer: Simula UiB)’
  • Issam Maarouf, 2019-2023: ‘Coding for DNA-based storage’


E-mail:            [email protected]
Homepage:    https://no.linkedin.com/in/sondre-r%C3%B…

Students supervised:

Publications co-authored with COINS students:

  1. Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth (2017). Yoyo tricks with AES
  2. Navid Ghaedi Bardeh, Sondre Rønjom (2019). Practical attacks on reduced-round AES
  3. Navid Ghaedi Bardeh, Sondre Rønjom (2019). The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts


E-mail:            [email protected]
Homepage:    http://www.uib.no/persons/Igor.Semaev

Students supervised:

  • Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
  • Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’
  • Isaac Canales Martinez, 2017-2020: ‘Algebraic analysis of Stream ciphers’
  • Alessandro Budroni, 2017-2021: ‘Cryptoanalysis on LWE’

Publications co-authored with COINS students:

  1. Stian Fauskanger, Igor A. Semaev (2015). Statistical and Algebraic Properties of DES
  2. Stian Fauskanger, Igor A. Semaev (2016). Statistical and Algebraic Properties of DES


E-mail:            [email protected]
Homepage:    http://www.ii.uib.no/~oyvind/

Students supervised:

  • Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
  • Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’
  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
  • Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’
  • Morten Øygarden, 2018-2021: ‘Quantum Safe Cryptography’
  • Arne Tobias Malkenes Ødegaard, 2019-2022: ‘Post-quantum zk-SNARKs (employer: Simula UiB)’
  • Nicolas Costes, 2019-2022: ‘High Performance Power Analysis Attacks (employer: Simula UiB)’

Publications co-authored with COINS students:

  1. Mohsen Toorani, Øyvind Ytrehus (2015). Security protocols and related topics
  2. Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
  3. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations

University of Oslo


E-mail:            [email protected]
Homepage:    http://www.jus.uio.no/ifp/english/people…

Students supervised:

  • Samson Yoseph Esayas, 2015-2020: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’
  • Worku Gedefa Urgessa, 2017-2020: ‘The Role of IGOs and International Law in Securing Cyberspace’
  • Luca Tosoni, 2017-2020: ‘Regulating Cybersecurity: Challenges, Limits and Regulatory Options’
  • Peter Davis, 2018-2021: ‘Regulation of Cryptography: Logical, Legal and Normative Limits’


E-mail:            [email protected]
Homepage:    http://folk.uio.no/frank/

Students supervised:

  • Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’
  • Sara Mohammadi, 2018-2021: ‘Cyber-attack detection in smart grids with prosumers using machine learning’
  • Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’

Publications co-authored with COINS students:

  1. Sara Mohammadi, Frank Eliassen, Yan Zhang (2020). Effects of false data injection attacks on a local P2P energy trading market with prosumers
  2. Sara Mohammadi, Frank Eliassen, Yan Zhang, Hans-Arno Jacobsen (2021). Detecting false data injection attacks in peer to peer energy trading using machine learning


E-mail:            [email protected]
Homepage:    http://www.mn.uio.no/ifi/personer/vit/pa…

Students supervised:

  • Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’
  • Desta Haileselassie Hagos, 2015-2020: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’
  • Ramtin Aryan, 2016-2020: ‘Software-Defined Networking Policy Conflict Detection: a holistic approach (employer: Høgskolen i Oslo og Akershus)’


E-mail:            [email protected]
Homepage:    http://heim.ifi.uio.no/martingi/

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’


E-mail:            [email protected]
Homepage:    https://www.linkedin.com/in/thomas-grege…

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.mn.uio.no/ifi/english/people…

Students supervised:

  • Tamás Bisztray, 2019-2021: ‘Privacy by Design in Digital Infrastructures’

Publications co-authored with COINS students:

  1. Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen (2018). Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR


E-mail:            [email protected]
Homepage:    http://home.ifi.uio.no/paalh/

Students supervised:

  • Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’

Publications co-authored with COINS students:

  1. Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
  2. Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
  3. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  4. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  5. Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
  6. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  7. Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
  8. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
  9. Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
  10. Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
  11. Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
  12. Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
  13. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  14. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  15. Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
  16. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  17. Debesh Jha, Nikhil Kumar Tomar, Sharib Ali, Michael A. Riegler, Håvard D. Johansen, Thomas de Lange, Pål Halvorsen (2021). NanoNet: Real-Time Polyp Segmentation in VideoCapsule Endoscopy and Colonoscopy
  18. Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
  19. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  20. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  21. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
  22. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  23. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael A. Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Ove Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  24. Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
  25. Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
  26. Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
  27. Nikhil Kumar Tomar, Nabil Ibtehaz, Debesh Jha, Pål Halvorsen, Sharib Ali (2021). Improving generalizability in polyp segmentation using ensemble convolutional neural network
  28. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  29. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  30. Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset
  31. Sharib Ali, Noha Ghatwary, Debesh Jha, Pål Halvorsen (2021). Proceedings of the 3rd International Workshop and Challenge on Computer Vision in Endoscopy (EndoCV 2021)
  32. Steven Hicks, Debesh Jha, Vajira L B Thambawita, Pål Halvorsen, Bjørn Jostein Singstad, Sachin Gaur, Klas Pettersen, Morten Goodwin, Sravanthi Parasa, Thomas de Lange, Michael Alexander Riegler (2021). MedAI: Transparency in Medical Image Segmentation
  33. Steven A. Hicks, Debesh Jha, Vajira L B Thambawita, Hugo Lewi Hammer, Thomas de Lange, Sravanthi Parasa, Michael Riegler, Pål Halvorsen (2021). Medico Multimedia Task at MediaEval 2021: Transparency in Medical Image Segmentation


E-mail:            [email protected]
Homepage:    http://heim.ifi.uio.no/~cristi/index.sht…

Students supervised:

  • Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’
  • Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
  • Elahe Fazeldehkordi, 2017-2021: ‘Semantic Modelling and Measuring of Privacy for IoT in Smart Home’
  • Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’

Publications co-authored with COINS students:

  1. Manish Shrestha, Christian Johansen, Josef Noll (2017). Security Classification for Smart Grid Infra structures (long version)
  2. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  3. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  4. Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen (2018). The Future Mechanism and Information Flow Security
  5. Manish Shrestha, Christian Johansen, Josef Noll (2019). Criteria for Security Classification of Smart Home Energy Management Systems (long version)
  6. Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT
  7. Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
  8. Manish Shrestha, Christian Johansen, Josef Noll (2020). Criteria for security classification of smart home energy management systems
  9. Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures
  10. Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll (2020). Tool Support for Security Classification for Internet of Things (long version)
  11. Shukun Tokas, Olaf Owe, Christian Johansen (2020). Code Diversification Mechanisms for Internet of Things (Revised Version 2)
  12. Johanna Johansen, Josef Noll, Christian Johansen (2021). InfoInternet for education in the Global South: A study of applications enabled by free information-only internet access in technologically disadvantaged areas
  13. Johanna Johansen, Tore Pedersen, Christian Johansen (2021). Studying human-to-computer bias transference


E-mail:            [email protected]
Homepage:    http://folk.uio.no/josang/

Students supervised:

  • Ijlal Loutfi, 2014-2019: ‘Secure and Robust Network-based Systems’
  • Antonio Gonzalez Burgueño, 2014-2020: ‘Formal analysis for security ceremonies’
  • Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’
  • Vasileios Mavroeidis, 2016-2019: ‘Cyberthreat Detection and Analysis’
  • Siri Bromander, 2016-2021: ‘TOCSA (employer: Mnemonic)’
  • Kamer Vishi, 2016-2019: ‘Multimodal Biometrics in Identity and Access Management (IAM)’
  • Jon-Martin Storm, 2018-2021: ‘Efficient Cybersecurity Mechanisms for ICS and SCADA (employer: The Norwegian Water Resources and Energy Directorate)’
  • Åvald Åslaugson Sommervoll, 2018-2022: ‘Consequences of machine learning and quantum computing in the field of cryptology’

Publications co-authored with COINS students:

  1. Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic cyberthreat modelling
  2. Vasileios Mavroeidis, Audun Jøsang (2018). Data-Driven Threat Hunting Using Sysmon
  3. Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang (2018). A framework for data-driven physical security and insider threat detection
  4. Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang (2018). The impact of quantum computing on present cryptography
  5. Siri Bromander, Lilly Pijnenburg Muller, Martin Eian, Audun Jøsang (2020). Examining the “Known Truths” in Cyber Threat Intelligence – The Case of STIX
  6. Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg (2021). Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
  7. Åvald Åslaugson Sommervoll, Audun Jøsang (2021). Machine Learning for Offensive Cyber Operations


E-mail:            [email protected]
Homepage:    http://www.jus.uio.no/ifp/english/people…

Students supervised:

  • Peter Davis, 2018-2021: ‘Regulation of Cryptography: Logical, Legal and Normative Limits’

Publications co-authored with COINS students:

  1. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2015). Using Technology to Enhance Confidentiality and Regulatory Compliance by Design
  2. Samson Yoseph Esayas, Tobias Mahler (2015). Modelling compliance risk: a structured approach
  3. Samson Yoseph Esayas, Tobias Mahler, Bjørnar Solhaug (2015). An Integrated Approach for Compliance and Security Risk Assessment
  4. Samson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjørnstad, Veda Brubakk (2015). An integrated method for compliance and risk assessment
  5. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2016). Give Me a Sign: Expressing Contract Terms and Data Protection Requirements Visually in Cloud Computing
  6. Kevin McGillivray, Samson Yoseph Esayas, Tobias Mahler (2016). Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements for Cloud Computing Users


E-mail:            [email protected]
Homepage:    http://jnoll.net/

Students supervised:

  • Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
  • Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’
  • Maghsoud Morshedi Chinibolagh, 2017-2021: ‘Application specific routing for managed wireless access (employer: EyeNetworks)’

Publications co-authored with COINS students:

  1. Seraj Fayyad, Josef Noll (2014). Security and Safety Composition Methodology
  2. Seraj Fayyad, Josef Noll (2014). Toward Real Time IT Risk Assessment Methodology
  3. Iñaki Garitano, Seraj Fayyad, Josef Noll (2015). Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
  4. Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids
  5. Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
  6. Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
  7. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse (2017). Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial
  8. Manish Shrestha, Christian Johansen, Josef Noll (2017). Security Classification for Smart Grid Infra structures (long version)
  9. Seraj Fayyad, Josef Noll (2017). A Framework for Measurability of Security
  10. Maghsoud Morshedi, Josef Noll, Raheleh Kari (2018). Building Trustable Remote Monitoring and Management Systems
  11. Maghsoud Morshedi, Josef Noll (2019). Deploying Energy Efficient Wi-Fi Networks
  12. Manish Shrestha, Christian Johansen, Josef Noll (2019). Criteria for Security Classification of Smart Home Energy Management Systems (long version)
  13. Maghsoud Morshedi Chinibolagh, Josef Alfons Noll (2020). A Survey on Prediction of PQoS Using Machine Learning on Wi-Fi Networks
  14. Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT
  15. Manish Shrestha, Christian Johansen, Josef Noll (2020). Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
  16. Manish Shrestha, Christian Johansen, Josef Noll (2020). Criteria for security classification of smart home energy management systems
  17. Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures
  18. Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll (2020). Tool Support for Security Classification for Internet of Things (long version)
  19. Johanna Johansen, Josef Noll, Christian Johansen (2021). InfoInternet for education in the Global South: A study of applications enabled by free information-only internet access in technologically disadvantaged areas
  20. Maghsoud Morshedi, Josef Noll (2021). Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning
  21. Maghsoud Morshedi, Josef Noll (2021). Estimating PQoS of Video Streaming on Wi-Fi Networks Using Machine Learning


E-mail:            [email protected]
Homepage:    http://cwi.unik.no/wiki/Nils_Nordbotten

Students supervised:


E-mail:            [email protected]
Homepage:    http://heim.ifi.uio.no/~olaf

Students supervised:

  • Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’
  • Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’
  • Farzane Karami, 2017-2020: ‘Language-Based Security, Addressing Active Object and Distributed Systems’
  • Johanna Johansen, 2018-2021: ‘Human Aspects of Privacy in IoT’

Publications co-authored with COINS students:

  1. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  2. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  3. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  4. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  5. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2018). An Evaluation of Interaction Paradigms for Active Objects
  6. Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen (2018). The Future Mechanism and Information Flow Security
  7. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2018). Language-Based Support for GDPR-Related Privacy Requirements
  8. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas (2018). A secrecy-preserving language for distributed and object-oriented systems
  9. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2019). Summary of: An Evaluation of Interaction Paradigms for Active Objects
  10. Shukun Tokas, Olaf Owe (2019). A Formal Framework for Consent Management
  11. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2019). Language-Based Mechanisms for Privacy by Design
  12. Farzane Karami, Olaf Owe, Gerardo Schneider (2020). Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures. In Proceedings of The 25th Nordic Conference on Secure IT Systems (NortdSec 2020). To appear in Lecture Notes in Computer Science (17 pages)
  13. Shukun Tokas, Olaf Owe (2020). A Formal Framework for Consent Management
  14. Shukun Tokas, Olaf Owe, Christian Johansen (2020). Code Diversification Mechanisms for Internet of Things (Revised Version 2)
  15. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2020). Language-based mechanisms for privacy-by-design
  16. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2021). Static checking of GDPR-related privacy compliance for object-oriented distributed systems


E-mail:            [email protected]
Homepage:    http://www.mn.uio.no/ifi/english/people/…

Students supervised:

  • Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’

Publications co-authored with COINS students:

  1. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  2. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  3. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2018). An Evaluation of Interaction Paradigms for Active Objects
  4. Shukun Tokas, Toktam Ramezanifarkhani (2018). Language-Based Support for GDPR-Related Privacy Requirements
  5. Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas (2018). A secrecy-preserving language for distributed and object-oriented systems
  6. Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani (2019). Summary of: An Evaluation of Interaction Paradigms for Active Objects
  7. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2019). Language-Based Mechanisms for Privacy by Design
  8. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2020). Language-based mechanisms for privacy-by-design
  9. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani (2021). Static checking of GDPR-related privacy compliance for object-oriented distributed systems


E-mail:            [email protected]
Homepage:    http://www.mn.uio.no/ifi/english/people/…

Students supervised:

  • Shukun Tokas, 2016-2021: ‘Security For Communicating Object Systems’


E-mail:            [email protected]
Homepage:    https://folk.uio.no/amirhost/

Students supervised:

  • Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’


E-mail:            [email protected]
Homepage:    http://folk.uio.no/jimtoer/

Students supervised:

  • Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2018). Sensor Sequential Data Prediction
  2. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  3. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  4. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults
  5. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
  6. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults


E-mail:            [email protected]
Homepage:    http://folk.uio.no/romanvi/

Students supervised:


E-mail:            [email protected]
Homepage:    http://www.mn.uio.no/ifi/personer/vit/ar…

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’


E-mail:            [email protected]
Homepage:    http://folk.uio.no/yanzhang/

Students supervised:

  • Sara Mohammadi, 2018-2021: ‘Cyber-attack detection in smart grids with prosumers using machine learning’
  • Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’

Publications co-authored with COINS students:

  1. Sara Mohammadi, Frank Eliassen, Yan Zhang (2020). Effects of false data injection attacks on a local P2P energy trading market with prosumers
  2. Sara Mohammadi, Frank Eliassen, Yan Zhang, Hans-Arno Jacobsen (2021). Detecting false data injection attacks in peer to peer energy trading using machine learning


E-mail:            [email protected]
Homepage:    http://folk.uio.no/peterol/

Students supervised:


E-mail:            [email protected]
Homepage:    http://www.jus.uio.no/ifp/personer/vit/i…

Students supervised:

  • Samson Yoseph Esayas, 2015-2020: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’

University of Stavanger


E-mail:            [email protected]
Homepage:    https://www.uis.no/om-uis/kontakt-oss/fi…

Students supervised:

  • Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
  • Cristina Heghedus, 2016-2020: ‘Dara driven energy informatics’
  • Aida Mehdipour Pirbazari, 2017-2021: ‘Predictive Analytics for power stability in smart communities’
  • Nikita Karandikar, 2018-2021: ‘Driving behavior change by incentivizing households to trade renewable energy in a gamified community level marketplace’
  • Dhanya Therese Jose, 2018-2021: ‘Security and privacy for data-driven energy informatics’

Publications co-authored with COINS students:

  1. Tim Majchrzak, Antorweep Chakravorty (2012). Improving the Compliance of Transplantation Medicine Patients with an Integrated Mobile System
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  7. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  8. Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
  9. Antorweep Chakravorty (2014). Amerikanere hyller norsk student-idé
  10. Antorweep Chakravorty (2014). Smart eller overvåket?
  11. Antorweep Chakravorty (2014). Spørsmål om Smarthus
  12. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  13. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  14. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  15. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  16. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  17. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  18. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  19. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  20. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
  21. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Informatics Applicability; Machine Learning and Deep Learning
  22. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Load Forecasting Using Deep Learning
  23. Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Frameworks. Comparison on Public Transportation Prediction
  24. Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Architectures for Electricity Consumption Forecasting
  25. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2020). Deep Learning for Short-Term Energy Load Forecasting Using Influential Factors


E-mail:            [email protected]
Homepage:    https://www.uis.no/om-uis/kontakt-oss/fi…

Students supervised:

Publications co-authored with COINS students:

  1. Chunlei Li, Xiangyong Zeng, Lei Hu (2010). A class of binary cyclic codes with five weights
  2. Houzhen Wang, Chunlei Li (2010). Design theory and method of multivariate hash function
  3. Huanguo Zhang, Chunlei Li, Ming Tang (2011). Capability of evolutionary cryptosystems against differential cryptanalysis
  4. Huanguo Zhang, Chunlei Li, Ming Tang (2011). Evolutionary cryptography against multidimensional linear cryptanalysis
  5. Chunlei Li (2012). The lower bound of the second order nonlinearity of a class of Bent functions
  6. Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
  7. Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
  8. Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
  9. Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
  10. Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
  11. Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li (2013). A family of quadriphase sequences of period 4(2 n−1)with low correlation and large linear span
  12. Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
  13. Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
  14. Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
  15. Chunlei Li (2014). Sequences and Linear Codes from Highly Nonlinear Functions
  16. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
  17. Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan (2014). Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
  18. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
  19. Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
  20. Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
  21. Jayachander Surbiryala, Chunlei Li, Rong Chunming (2017). A framework for improving security in cloud computing


E-mail:            [email protected]
Homepage:    http://www.ux.uis.no/~meling/

Students supervised:


E-mail:            [email protected]
Homepage:    http://www.chunming.net/

Students supervised:

  • Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’
  • Antorweep Chakravorty, 2012-2015: ‘Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes’
  • Aryan TaheriMonfared, 2012-2015: ‘Building Network Security Services Using Software Defined Networking’
  • Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
  • Jayachander Surbiryala, 2016-2019: ‘Information Security in Cloud Computing’
  • Cristina Heghedus, 2016-2020: ‘Dara driven energy informatics’
  • Aida Mehdipour Pirbazari, 2017-2021: ‘Predictive Analytics for power stability in smart communities’
  • Nikita Karandikar, 2018-2021: ‘Driving behavior change by incentivizing households to trade renewable energy in a gamified community level marketplace’
  • Dhanya Therese Jose, 2018-2021: ‘Security and privacy for data-driven energy informatics’

Publications co-authored with COINS students:

  1. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Aryan TaheriMonfared, Chunming Rong (2013). Multi-tenant Network Monitoring Based on Software Defined Networking
  7. Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
  8. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  9. Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
  10. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  11. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  12. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  13. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  14. Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
  15. Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
  16. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  17. Aryan TaheriMonfared, Chunming Rong (2015). Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants
  18. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
  19. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  20. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
  21. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
  22. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
  23. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  24. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  25. Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System
  26. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming (2017). Resource Allocation in Cloud-Based Distributed Cameras
  27. Jayachander Surbiryala, Chunlei Li, Rong Chunming (2017). A framework for improving security in cloud computing
  28. Anton Shchipanov, Roman Berenblyum, Alexey A. Khrulenko, Lars Kollbotn, Rong Chunming, Cristina Viorica Heghedus, Fredrik Haugsand (2018). Well Data Analytics: from Case Studies to Solutions
  29. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
  30. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Informatics Applicability; Machine Learning and Deep Learning
  31. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2018). Energy Load Forecasting Using Deep Learning
  32. Jayachander Surbiryala, Rong Chunming (2018). Data Recovery and Security in Cloud
  33. Jayachander Surbiryala, Rong Chunming (2018). Data recovery in cloud using forensic tools
  34. Jayachander Surbiryala, Rong Chunming (2018). Secure customer data over cloud forensic reconstruction
  35. Jayachander Surbiryala, Bikash Agrawal, Rong Chunming (2018). Improve Security Over Multiple Cloud Service Providers for Resource Allocation
  36. Cristina Viorica Heghedus, Anton Shchipanov, Chunming Rong (2019). Pattern Recognition and Flow Rate Reconstruction: PDG Data Analysis Using Machine Learning
  37. Cristina Viorica Heghedus, Anton Shchipanov, Rong Chunming (2019). Advancing Deep Learning to Improve Upstream Petroleum Monitoring
  38. Cristina Viorica Heghedus, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Frameworks. Comparison on Public Transportation Prediction
  39. Cristina Viorica Heghedus, Santiago Segarra, Antorweep Chakravorty, Chunming Rong (2019). Neural Network Architectures for Electricity Consumption Forecasting
  40. Jayachander Surbiryala, Rong Chunming (2019). Cloud Computing: History and Overview
  41. Cristina Viorica Heghedus, Rong Chunming (2020). Artificial Intelligence Models Used for Prediction in the Energy Internet
  42. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming (2020). Deep Learning for Short-Term Energy Load Forecasting Using Influential Factors


E-mail:            [email protected]
Homepage:    http://www.wlodarczyk.eu

Students supervised:

  • Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’

Publications co-authored with COINS students:

  1. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
  7. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  8. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  9. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  10. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  11. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  12. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  13. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
  14. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  15. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
  16. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
  17. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
  18. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  19. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  20. Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System

University of Tromsø


E-mail:            [email protected]
Homepage:    http://www.cs.uit.no/~aa/

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  2. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  3. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing
  4. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing


E-mail:            [email protected]
Homepage:    http://telemed.no/johan-gustav-bellika.4…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
  2. Kassaye Yitbarek Yigzaw, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow infectious disease forecast service
  3. Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
  4. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  5. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  6. Stein Olav Skrøvseth, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Per Atle Bakkevoll, Gunnar Skov Simonsen, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow communicable disease outbreak detection approach
  7. Johan Gustav Bellika, Torje Dahle Henriksen, Kassaye Yitbarek Yigzaw (2014). The Snow System – a Decentralized Medical Data Processing System
  8. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
  9. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
  10. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of Secure Multi-Party Computation for Reuse of Distributed Electronic Health Data
  11. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of secure multi-party computation for reuse of distributed electronic health data
  12. Luis Marco Ruiz, Pablo Pazos, Koray Atalag, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Enabling Clinical Data Reuse with openEHR Data Warehouse Environments
  13. Meskerem Asfaw Hailemichael, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Emnet: a tool for privacy-preserving statistical computing on distributed health data
  14. Andrius Budrionis, Luis Marco-Ruiz, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
  15. Andrius Budrionis, Marco-ruiz Luis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
  16. Kassaye Yitbarek Yigzaw, Antonis Michalas, Johan Gustav Bellika (2016). Secure and scalable statistical computation of questionnaire data in R
  17. Luis Marco Ruiz, Andrius Budrionis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Interoperability Mechanisms of Clinical Decision Support Systems: A Systematic Review


E-mail:            [email protected]
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            [email protected]
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            [email protected]
Homepage:    http://mit.cs.uit.no/

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
  2. Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
  3. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  4. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  5. Daniel Karlsson, Andrius Budrionis, Ann Bygholm, Mariann Fossum, Conceicao Granja, Gunnar Hartvigsen, Ole Hejlesen, Maria Hägglund, Monika Alise Johansen, Lars Lindsköld, Santiago Martinez, Carl Erik Moe, Luis Marco Ruiz, Vivian Vimarlund, Kassaye Yitbarek Yigzaw (2016). Proceedings from The 14th Scandinavian Health Informatics Conference 2016
  6. Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen (2019). K-CUSUM: Cluster Detection Mechanism in EDMON
  7. Prosper Yeng, Ashenafi Zebene Woldaregay, Gunnar Hartvigsen (2019). K-CUSUM: Cluster Detection Mechanism in EDMON
  8. Prosper Yeng, Ashenafi Zebene Woldaregay, Terje Geir Solvoll, Gunnar Hartvigsen (2020). Cluster detection mechanisms for syndromic surveillance systems: Systematic review and framework development


E-mail:            [email protected]
Homepage:    https://uit.no/om/enhet/ansatte/person?p…

Students supervised:

  • Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’

Publications co-authored with COINS students:

  1. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
  2. Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
  3. Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
  4. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  5. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  6. Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
  7. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  8. Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
  9. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
  10. Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
  11. Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
  12. Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
  13. Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
  14. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  15. Debesh Jha, Nikhil Kumar Tomar, Sharib Ali, Michael A. Riegler, Håvard D. Johansen, Thomas de Lange, Pål Halvorsen (2021). NanoNet: Real-Time Polyp Segmentation in VideoCapsule Endoscopy and Colonoscopy
  16. Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
  17. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  18. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  19. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
  20. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  21. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael A. Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Ove Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  22. Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
  23. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  24. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation


E-mail:            [email protected]
Homepage:    https://en.uit.no/om/enhet/ansatte/perso…

Students supervised:

  • Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’

Publications co-authored with COINS students:

  1. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
  2. Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
  3. Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
  4. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  5. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  6. Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
  7. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  8. Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
  9. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
  10. Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
  11. Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
  12. Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
  13. Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
  14. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  15. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  16. Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
  17. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  18. Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
  19. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  20. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  21. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
  22. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  23. Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
  24. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  25. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  26. Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset


E-mail:            [email protected]
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

Publications co-authored with COINS students:

  1. Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid


E-mail:            [email protected]
Homepage:    http://www.math.uit.no/ansatte/hugues/in…

Students supervised:

Publications co-authored with COINS students:

  1. Jan Nyquist Roksvold, Hugues Verdure (2013). The generalized weight polynomial – and how it is determined by Betti-numbers
  2. Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid

External supervisors


E-mail:            [email protected]
Homepage:    https://www.nr.no/~abie/

Students supervised:

  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’

Publications co-authored with COINS students:

  1. Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids


E-mail:            
Homepage:    https://www.mnemonic.no/midnightsunsecur…

Students supervised:

Publications co-authored with COINS students:

  1. Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic cyberthreat modelling
  2. Siri Bromander, Lilly Pijnenburg Muller, Martin Eian, Audun Jøsang (2020). Examining the “Known Truths” in Cyber Threat Intelligence – The Case of STIX
  3. Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg (2020). Modeling Cyber Threat Intelligence
  4. Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg (2021). Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange


E-mail:            [email protected]
Homepage:    https://www.hioa.no/tilsatt/boningf

Students supervised:

  • Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm


E-mail:            [email protected]
Homepage:    http://www.nr.no/~lothar/

Students supervised:

  • Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’

Publications co-authored with COINS students:

  1. Lothar Fritsch, Ebenezer Paintsil (2010). 1st PhD retreat documentation – Minutes of the PETweb II PhD workshop, April 15-16, 2010
  2. Ebenezer Paintsil, Lothar Fritsch (2011). A Taxonomy of Privacy and Security Risks Contributing Factors
  3. Ebenezer Paintsil, Lothar Fritsch (2011). Taxonomy of Privacy and Security Risks Contributing Factors
  4. Ebenezer Paintsil, Lothar Fritsch (2011). Towards Legal Privacy Risk Assessment Automation in Social Media
  5. Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets
  6. Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems
  7. Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems


E-mail:            [email protected]
Homepage:    https://www.forensicinstitute.nl/researc…

Students supervised:

  • Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’


E-mail:            [email protected]
Homepage:    https://www.chalmers.se/en/staff/Pages/a…

Students supervised:

  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’
  • Albin Severinson, 2017-2021: ‘Coding for Distributed Computing’


E-mail:            [email protected]
Homepage:    

Students supervised:

  • Øyvind Toftegaard, 2020-2024: ‘Resilient Future Smart Grid Ecosystem – Upcoming Steps in Innovation, Business Cases, its Regulation and Supervision (employer: Norwegian Water Resources and Energy Directorate – Norwegian Energy Regulatory Authority)’

Publications co-authored with COINS students:

  1. Jon-Martin Storm, Janne Merete Hagen, Øyvind Anders Arntzen Toftegaard (2021). A Survey of Using Process Data and Features of Industrial Control Systems in Intrusion Detection


E-mail:            
Homepage:    

Students supervised:

  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’


E-mail:            [email protected]
Homepage:    https://www.ntnu.edu/employees/kirsi.hel…

Students supervised:

  • Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’

Publications co-authored with COINS students:

  1. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok (2018). Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  2. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin (2018). Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  3. Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo (2018). Cognitive Profiles of Female Cyber Defence Operators
  4. Kirsi Marjaana Helkala, Benjamin James Knox (2018). Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
  5. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala (2018). Macrocognitive approaches on Cyber Performance
  6. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin (2018). Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition
  7. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen (2018). Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  8. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark (2018). An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  9. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
  10. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
  11. Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower
  12. Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Cognitive Profiles and Education of Female Cyber Defence Operators
  13. Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala (2019). Self-regulation and cognitive agility in cyber operations
  14. Sjur Johansen Øfsteng, Ina Garthe, Øyvind Jøsok, Silje Knox, Kirsi Marjaana Helkala, Benjamin James Knox, Stian Ellefsen, Bent Rønnestad (2020). No effect of increasing protein intake during military exercise with severe energy deficit on body composition and performance


E-mail:            [email protected]
Homepage:    https://www.professoren.tum.de/en/jacobs…

Students supervised:

  • Min Zhang, 2017-2020: ‘Design, analysis and implementation of P2P energy trading platform based on fog computing and blockchain technology’


E-mail:            [email protected]
Homepage:    

Students supervised:

  • Nektaria Kaloudi, 2018-2022: ‘Cybersecurity, Safety, and Resilience of Smart Cities’


E-mail:            
Homepage:    

Students supervised:


E-mail:            [email protected]
Homepage:    http://kodu.ut.ee/~lipmaa/

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.rug.nl/staff/g.p.mifsud.bonn…

Students supervised:

  • Merve Bas Seyyar, 2018-2020: ‘Privacy by Design in Large Scale Digital Forensics (employer: The University of Groningen)’


E-mail:            [email protected]
Homepage:    https://www.simula.no/people/leon

Students supervised:

  • Syed Moeen Ali Naqvi, 2020-2023: ‘Towards Self-Healing Software through Anomaly Detection and Adaptive learning (employer: Simula Research Laboratory)’


E-mail:            [email protected]
Homepage:    https://no.linkedin.com/in/leif-nilsen-2…

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.dasec.h-da.de/staff/christia…

Students supervised:

  • Pawel Drozdowski, 2016-2020: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’


E-mail:            [email protected]
Homepage:    http://www.bcrenner.de/

Students supervised:

  • Hafiz Areeb Asad, 2021-2025: ‘Machine Learning for Cognitive Power Management in IoT’


E-mail:            [email protected]
Homepage:    https://www.simula.no/people/michael

Students supervised:

  • Debesh Jha, 2018-2021: ‘Secure and Privacy Preserving Machine-Learning Methods for Disease detection and reporting on Medical Multimedia Data (employer: Simula School of Research and Innovation)’

Publications co-authored with COINS students:

  1. Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen (2018). Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
  2. Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
  3. Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen (2018). The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
  4. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  5. Debesh Jha, Pia Smedsrud, Michael Riegler, Dag Johansen, Thomas de Lange, Pål Halvorsen, Håvard D. Johansen (2019). ResUNet++: An Advanced Architecture for Medical Image Segmentation
  6. Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen (2020). DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
  7. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2020). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  8. Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A segmented polyp dataset
  9. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen (2020). Kvasir-SEG: A Segmented Polyp Dataset
  10. Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen (2020). Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
  11. Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange (2020). HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
  12. Tobias Ross, Annika Reinke, Peter M. Full, Martin Wagner, Hannes Kenngott, Martin Apitz, Hellena Hempe, Diana Mindroc Filimon, Patrick Scholz, Thuy Nuong Tran, Pierangela Bruno, Pablo Arbeláez, Gui-Bin Bian, Sebastian Bodenstedt, Jon Lindström Bolmgren, Laura Bravo-Sánchez, Hua-Bin Chen, Cristina González, Dong Guo, Pål Halvorsen, Pheng-Ann Heng, Enes Hosgor, Zeng-Guang Hou, Fabian Isensee, Debesh Jha, Tingting Jiang, Yueming Jin, Kadir Kirtac, Sabrina Kletz, Stefan Leger, Zhixuan Li, Klaus H. Maier-Hein, Zhen-Liang Ni, Michael Riegler, Klaus Schoeffmann, Ruohua Shi, Stefanie Speidel, Michael Stenzel, Isabell Twick, Gutai Wang, Jiacheng Wang, Liansheng Wang, Lu Wang, Yujie Zhang, Yan-Jie Zhou, Lei Zhu, Manuel Wiesenfarth, Annette Kopp-Schneider, Beat P. Müller-Stich, Lena Maier-Hein (2020). Comparative validation of multi-instance instrument segmentation in endoscopy: results of the ROBUST-MIS 2019 challenge
  13. Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler (2020). An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
  14. Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen (2020). PMData: a sports logging dataset
  15. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Pal Umapada (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  16. Abhishek Srivastava, Sukalpa Chanda, Debesh Jha, Michael Riegler, Pål Halvorsen, Dag Johansen, Umapada Pal (2021). PAANet: Progressive Alternating Attention for Automatic Medical Image Segmentation
  17. Abhishek Srivastava, Debesh Jha, Sukalpa Chanda, Umapada Pal, Håvard D. Johansen, Dag Johansen, Michael Riegler, Sharib Ali, Pål Halvorsen (2021). MSRF-Net: A Multi-Scale Residual Fusion Network for Biomedical Image Segmentation
  18. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  19. Debesh Jha, Pia Smedsrud, Dag Johansen, Thomas de Lange, Håvard D. Johansen, Pål Halvorsen, Michael Alexander Riegler (2021). A Comprehensive Study on Colorectal Polyp Segmentation with ResUNet++, Conditional Random Field and Test-Time Augmentation
  20. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  21. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen (2021). Exploring Deep Learning Methods for Real-Time Surgical Instrument Segmentation in Laparoscopy
  22. Debesh Jha, Sharib Ali, Nikhil Kumar Tomar, Håvard D. Johansen, Dag Johansen, Jens Rittscher, Michael Riegler, Pål Halvorsen (2021). Real-Time Polyp Detection, Localization and Segmentation in Colonoscopy Using Deep Learning
  23. Debesh Jha, Sharib Ali, Krister Emanuelsen, Steven Hicks, Vajira L B Thambawita, Enrique Garcia-Ceja, Michael Riegler, Thomas de Lange, Peter T Schmidt, Håvard D. Johansen, Dag Johansen, Pål Halvorsen (2021). Kvasir-Instrument: Diagnostic and Therapeutic Tool Segmentation Dataset in Gastrointestinal Endoscopy
  24. Debesh Jha, Sharib Ali, Steven Hicks, Vajira L B Thambawita, Hanna Borgli, Pia Smedsrud, Thomas de Lange, Konstantin Pogorelov, Xiaowei Wang, Philipp Harzig, Minh-Triet Tran, Wenhua Meng, Trung-Hieu Hoang, Danielle Dias, Tobey H. Ko, Taruna Agrawal, Olga Ostroukhova, Zeshan Khan, Muhammed Atif Tahir, Yang Liu, Yuan Chang, Mathias Kirkerød, Dag Johansen, Mathias Lux, Håvard D. Johansen, Michael Riegler, Pål Halvorsen (2021). A comprehensive analysis of classification methods in gastrointestinal endoscopy imaging
  25. Enrique Garcia-Ceja, Vajira L B Thambawita, Steven Hicks, Debesh Jha, Petter Jakobsen, Hugo Lewi Hammer, Pål Halvorsen, Michael Riegler (2021). HTAD: A Home-Tasks Activities Dataset with Wrist-Accelerometer and Audio Features
  26. Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
  27. Inga Strumke, Steven Hicks, Vajira L B Thambawita, Debesh Jha, Sravanthi Parasa, Michael Alexander Riegler, Pål Halvorsen (2021). Artificial Intelligence in Gastroenterology
  28. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  29. Nikhil Kumar Tomar, Debesh Jha, Sharib Ali, Håvard D. Johansen, Dag Johansen, Michael Riegler, Pål Halvorsen (2021). DDANet: Dual Decoder Attention Network for Automatic Polyp Segmentation
  30. Pia Smedsrud, Vajira L B Thambawita, Steven Hicks, Henrik Gjestang, Oda Olsen Nedrejord, Espen Næss, Hanna Borgli, Debesh Jha, Tor Jan Berstad, Sigrun Losada Eskeland, Mathias Lux, Håvard Espeland, Andreas Petlund, Duc Tien Dang Nguyen, Enrique Garcia-Ceja, Dag Johansen, Peter Thelin Schmidt, Ervin Toth, Hugo Lewi Hammer, Thomas de Lange, Michael Alexander Riegler, Pål Halvorsen (2021). Kvasir-Capsule, a video capsule endoscopy dataset
  31. Steven Hicks, Debesh Jha, Vajira L B Thambawita, Pål Halvorsen, Bjørn Jostein Singstad, Sachin Gaur, Klas Pettersen, Morten Goodwin, Sravanthi Parasa, Thomas de Lange, Michael Alexander Riegler (2021). MedAI: Transparency in Medical Image Segmentation
  32. Steven A. Hicks, Debesh Jha, Vajira L B Thambawita, Hugo Lewi Hammer, Thomas de Lange, Sravanthi Parasa, Michael Riegler, Pål Halvorsen (2021). Medico Multimedia Task at MediaEval 2021: Transparency in Medical Image Segmentation


E-mail:            [email protected]
Homepage:    http://cwi.unik.no/wiki/Davide_Roverso

Students supervised:

  • Manish Shrestha, 2016-2021: ‘Measurable security and privacy for services on the Smart Electricity Grid’

Publications co-authored with COINS students:

  1. Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso (2020). A Methodology for Security Classification applied to Smart Grid Infrastructures


E-mail:            [email protected]
Homepage:    http://www.telemed.no/stein-olav-skroevs…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            [email protected]
Homepage:    https://twitter.com/cryptostam

Students supervised:

  • Hans Heum, 2019-2021: ‘Side-channel attacks in a multi-user setting (employer: Simula UiB)’
  • Alessandro Melloni, 2019-2022: ‘Security of Protocols and Privacy Enhancing Technologies (employer: Simula UiB)’
  • Nicolas Costes, 2019-2022: ‘High Performance Power Analysis Attacks (employer: Simula UiB)’


E-mail:            [email protected]
Homepage:    https://www.inn.no/om-hoegskolen/ansatte…

Students supervised:

  • Benjamin Knox, 2018-2020: ‘Cyberpower praxis: a study of how to improve understanding and governance in the cyber domain (employer: Forsvaret)’

Publications co-authored with COINS students:

  1. Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok (2018). Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
  2. Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin (2018). Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
  3. Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo (2018). Cognitive Profiles of Female Cyber Defence Operators
  4. Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala (2018). Macrocognitive approaches on Cyber Performance
  5. Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin (2018). Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition
  6. Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen (2018). Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
  7. Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark (2018). An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
  8. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
  9. Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo (2018). Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
  10. Benjamin James Knox, Ricardo Gregorio Lugo, Stefan Sütterlin (2019). Cognisance as a human factor in military cyber defence education
  11. Benjamin James Knox, Ricardo Gregorio Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Slow Education and Cognitive Agility: Improving Military Cyber Cadet Cognitive Performance for Better Governance of Cyberpower
  12. Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin (2019). Cyber Defense Officer Profiles and Performance factors
  13. Ricardo Gregorio Lugo, Andrea Firth-Clark, Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Stefan Sütterlin (2019). Cognitive Profiles and Education of Female Cyber Defence Operators
  14. Stefan Sütterlin, Benjamin James Knox, Ricardo Gregorio Lugo (2019). TalTechi küberkaitseteadlased: ainult tehnilistest oskustest ja teadmistest küberkaitses ei piisa
  15. Øyvind Jøsok, Ricardo Gregorio Lugo, Benjamin James Knox, Stefan Sütterlin, Kirsi Marjaana Helkala (2019). Self-regulation and cognitive agility in cyber operations
  16. Ricardo Gregorio Lugo, Benjamin James Knox, Øyvind Jøsok, Stefan Sütterlin (2020). Variable Self-efficacy as a Measurement for Behaviors in Cyber Security Operations


E-mail:            [email protected]
Homepage:    https://www.hioa.no/tilsatt/thanh

Students supervised:

  • Ashish Rauniyar, 2016-2021: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm


E-mail:            [email protected]
Homepage:    https://ahc.leeds.ac.uk/design/staff/516…

Students supervised:


E-mail:            [email protected]
Homepage:    https://www.hioa.no/tilsatt/evizou

Students supervised:

  • Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Flavia Dias Casagrande, Evi Zouganeli (2018). Occupancy and Daily Activity Event Modelling in Smart Homes for Older Adults with Mild Cognitive Impairment or Dementia
  2. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2018). Sensor Sequential Data Prediction
  3. Evi Zouganeli, Flavia Dias Casagrande (2019). Hvordan kan kunstig intelligens støtte eldre til å leve et selvstendig liv hjemme og hva har Assisted Living prosjektet bidratt med.
  4. Flavia Dias Casagrande, Evi Zouganeli (2019). Activity Recognition and Prediction in Real Homes
  5. Flavia Dias Casagrande, Evi Zouganeli (2019). Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes
  6. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  7. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Comparison of Probabilistic Models and Neural Networks on Prediction of Home Sensor Events
  8. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Predicting Sensor Events, Activities, and Time of Occurrence Using Binary Sensor Data From Homes With Older Adults
  9. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Prediction of the Next Sensor Event and Its Time of Occurrence in Smart Homes
  10. Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli (2019). Sensor Event Prediction using Recurrent Neural Network in Smart Homes for Older Adults
  11. Flavia Dias Casagrande, Oda Olsen Nedrejord, Wonho Lee, Evi Zouganeli (2019). Action Recognition in Real Homes using Low Resolution Depth Video Data


E-mail:            [email protected]
Homepage:    https://www.linkedin.com/in/aarnes

Students supervised:

  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’