Below you can see the research output generated by Ph.D. student members of COINS.
Mohamed Abomhara
- Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg. Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification
Vivek Agrawal
- Vivek Agrawal, Einar Arthur Snekkenes. UnRizkNow: An open electronic community of practice for information security professionals
- Vivek Agrawal. Secure migration to the cloud
- Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
- Vivek Agrawal, Einar Arthur Snekkenes. Creating a successful Communities of practice
- Vivek Agrawal, Einar Arthur Snekkenes. UnRizkNow: A community of practice for information security risk practitioners
- Vivek Agrawal. Challenges and opportunities in sharing information security knowledge
- Vivek Agrawal, Einar Arthur Snekkenes. Utfordringer og muligheter for deling av informasjon innen Cyber Security
- Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
- Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard
- Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
- Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
- Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
- Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
- Vivek Agrawal. A Framework for the Information Classification in ISO 27005 Standard
- Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
- Vivek Agrawal, Einar Arthur Snekkenes. Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
- Vivek Agrawal, Einar Arthur Snekkenes. An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
Jayachander Surbiryala
- Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing
- Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
- Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras
Hamed Arshad
- Hamed Arshad, R Abbas. A secure authentication and key agreement scheme for roaming service with user anonymity
- A Irshad, S Kumari, X Li, F Wu, S A Chaudhry, Hamed Arshad. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
- Hamed Arshad, Morteza Nikooghadam, S Avezverdi, M Nazari. Design and FPGA implementation of an efficient security mechanism for mobile pay TV systems
Ramtin Aryan
- Ramtin Aryan, Anis Yazidi, Paal E. Engelstad, Øivind Kure. A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
- Ramtin Aryan, Anis Yazidi, Paal E. Engelstad, Øivind Kure. A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
Siri Bromander
- Siri Bromander. Ethical Considerations in Sharing Cyber Threat Intelligence
- Vasileios Mavroeidis, Siri Bromander. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.
Chris Carr
- Colin Alexander Boyd, Christopher Carr, Xavier Boyen, Thomas Haines. Bitcoin Unchained
- Britta Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for maximum flexibility and user-side control
- Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines. Key recovery: Inert and public
Benjamin Chetioui
- Benjamin Chetioui. Pizzagate Writeup (34C3 CTF)
- Benjamin Chetioui. Ssi Writeup (WhiteHat Grand Prix CTF 2017)
- Benjamin Chetioui. SqlSRF Writeup (SECCON CTF 2017)
Ambika Chitrakar
- Ambika Shrestha Chitrakar, Slobodan Petrovic. CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns
Flávia Dias Casagrande
- Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019)- Responsible innovations for dignified lives at home for persons with mild cognitive impairment or dementia
- Flavia Casagrande, Torhild Holthe, Erik Thorstensen. The Assisted Living Project (2016–2019) – ansvarlig forskning og innovasjon innenfor velferdsteknologi
Samson Yoseph Esayas
- Samson Yoseph Esayas. Commercialization of Personal Data and its Implications for the Foundations and Policy Boundaries of Data Privacy Law and Competition Law
- Samson Yoseph Esayas. Competition Law: Its Impact on Data Sharing and the Data Economy
- Samson Yoseph Esayas. Competition in Dissimilarity: Lessons in Privacy from the Facebook/WhatsApp Merger
- Samson Yoseph Esayas. Privacy-as-a-Quality Parameter of Competition: Some Reflections on the Scepticism
- Samson Yoseph Esayas. Reigning in FinTech through Data Protection Law and Competition Law
- Samson Yoseph Esayas. The Idea of ‘Emergent Properties’ in Data Privacy: Towards a Holistic Approach
Seraj Fayyad
- Seraj Fayyad, Josef Noll. Toward Objective Security Measurability and Manageability
- Seraj Fayyad, Josef Noll. A Framework for Measurability of Security
- Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse. Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial
Herman Galteland
- Herman Galteland, Stig Frode Mjølsnes, Ruxandra-Florentina Olimid. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
- Herman Galteland, Kristian Gjøsteen. Malware, Encryption, and Rerandomization – Everything is Under Attack
Harsha Sandaruwan Gardiyawasam Pussewalage
- Sasanka Niromi Ranasinghe, Harsha Gardiyawasam Pussewalage, Peter Hugh Middleton. Performance analysis of single cell solid oxide fuel cells
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Attribute based access control scheme with controlled access delegation for collaborative E-health environments
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment
Navid Ghaedi Bardeh
- Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth. Yoyo tricks with AES
Vasileios Gkioulos
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives
- Vasileios Gkioulos, Erko Risthein, Stephen Wolthusen. TACTICS: Validation of the security framework developed for tactical SOA
- Vasileios Gkioulos, Stephen Wolthusen. Security Requirements for the Deployment of Services Across Tactical SOA
- Vasileios Gkioulos, Stephen Wolthusen. Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
- Vasileios Gkioulos, Stephen Wolthusen. A Security Policy Infrastructure for Tactical Service Oriented Architectures
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
- Vasileios Gkioulos, Stephen Wolthusen. Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
Britta Hale
- Colin Alexander Boyd, Britta Hale. Secure Channels and Termination: The Last Word on TLS
- Britta Hale. Expanding ACCE: Robust Secure Channel Establishment
- Britta Hale. Low-Latency Key Exchange and Secure Channels
- Charlotte S. Rikardsen, Britta Hale, Stig Frode Mjølsnes. User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps
- Britta Hale, Christopher Carr, Danilo Gligoroski. CARIBE: Cascaded IBE for maximum flexibility and user-side control
- Britta Hale, Tibor Jager, Sebastian Lauer, Jorg Schwenk. Simple security definitions for and constructions of 0-RTT key exchange
- Britta Hale. Sikkerhet i en digital verden med hackere hakk i hæl
- Britta Hale. Secure Channels
- Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
- Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer. 0-RTT Key Exchange with Full Forward Secrecy
- Britta J. Hale. Signal: What, Why, How
- Britta J. Hale. Deep Web and Dark Web
Cristina Heghedus
- Cristina Viorica Heghedus. Ph.D. Forum: Forecasting Public Transit Using Neural Network Models
Håkon Jacobsen
- Håkon Jacobsen. A Modular Security Analysis of EAP and IEEE 802.11
- Chris Brzuska, Håkon Jacobsen. A modular security analysis of EAP and IEEE 802.11
Jan William Johnsen
- Andrii Shalaginov, Jan William Johnsen, Katrin Franke. Cyber Crime Investigations in the Era of Big Data
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen. IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
- Jan William Johnsen, Katrin Franke. Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
Farzane Karami
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures
- Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe. A High-Level Language for Active Objects with Future-Free Support of Futures
Dat Le Tien
- Shweta Shinde, Dat Tien Le, Shurti Topple, Prateek Saxena. PANOPLY: Low-TCB Linux Applications with SGX Enclaves
Yan Li
- Shaukat Ali, Yan Li, Tao Yue, Man Zhang. An Empirical Evaluation of Mutation and Crossover Operators for Multi-Objective Uncertainty-Wise Test Minimization
Vasileios Mavroeidis
- Kamer Vishi, Vasileios Mavroeidis. An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics
- Pierre Lison, Vasileios Mavroeidis. Neural Reputation Models learned from Passive DNS data
- Pierre Lison, Vasileios Mavroeidis. Automatic Detection of Malware-Generated Domains with Recurrent Neural Models
- Vasileios Mavroeidis, Siri Bromander. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.
- Vasileios Mavroeidis, Nicho Mathew. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks
Per Håkon Meland
- Per Håkon Meland. H2020: Digital Security
- Per Håkon Meland. What’s hot or not in cyber security research and innovation
- Per Håkon Meland. Cyber Security in Merchant Shipping (CySiMS)
- Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe, Fredrik Seehusen. Facing uncertainty in cyber insurance policies
- Christian Frøystad, Karin Bernsmed, Per Håkon Meland. Protecting Future Maritime Communication
- Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Tor Andre Myrvoll. Security Requirements for SATCOM Datalink Systems for Future Air Traffic Management
Maghsoud Morshedi Chinibolagh
- Maghsoud Morshedi, Hårek Haugerud, Kyrre Begnum. Making the Case for Highly Efficient Multicore Enabled Unikernels With IncludeOS
Christian Otterstad
- Christian W. Otterstad. On the effectiveness of non-readable executable memory against BROP
- Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole. Selected x86 Low-level Attacks and Mitigations
- Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices
Dmytro Piatkivskyi
- Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. Digital forensic implications of collusion attacks on the lightning network
Kyle Porter
- Kyle Porter, Slobodan Petrovic. On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
- Kyle Porter, Slobodan Petrovic. On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics
Ashish Rauniyar
- Ashish Rauniyar, Mohammad Irfan, Oka Danil Saputra, Jin Woo Kim, Ah Ra Lee, Jae Min Jang, Soo Young Shin. Design and Development of a Real-Time Monitoring System for Multiple Lead–Acid Batteries Based on Internet of Things
Patrick Schuch
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Deep Expectation for Estimation of Fingerprint Orientation Fields
- Patrick Schuch, Simon Schulz, Christoph Busch. Minutia-based Enhancement of Fingerprint Samples
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Intrinsic Limitations of Fingerprint Orientation Estimation
- Patrick Schuch, Simon Schulz, Christoph Busch. Minutia-based Enhancement of Fingerprint Samples
- Patrick Schuch, Simon Schulz, Christoph Busch. Deep Expectation for Estimation of Fingerprint Orientation Fields
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. Intrinsic Limitations of Fingerprint Orientation Estimation
- Patrick Schuch, Simon Schulz, Christoph Busch. Survey on the impact of fingerprint image enhancement
- Patrick Schuch, Simon Schulz, Christoph Busch. De-Convolutional Auto-Encoder for Enhancement of Fingerprint Samples
- Patrick Schuch, Simon-Daniel Schulz, Christoph Busch. ConvNet Regression for Fingerprint Orientations
Felix Schuckert
- Felix Schuckert, Basel Katt, Hanno Langweg. Source Code Patterns of SQL Injection Vulnerabilities
Andrii Shalaginov
- Andrii Shalaginov, Katrin Franke. A Deep Neuro-Fuzzy method for multi-label malware classification and fuzzy rules extraction
- Andrii Shalaginov. Computational Forensics
- Andrii Shalaginov, Jan William Johnsen, Katrin Franke. Cyber Crime Investigations in the Era of Big Data
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen. IEEE Big Data 1st International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2017
- Andrii Shalaginov. Fuzzy logic model for digital forensics: A trade-off between accuracy, complexity and interpretability
- Andrii Shalaginov. Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
- Andrii Shalaginov. Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection
- Andrii Shalaginov. Machine Learning Aided Malware Analysis – Research at NTNU
- Andrii Shalaginov, Katrin Franke. Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
Manish Shrestha
- Manish Shrestha, Christian Johansen, Josef Noll. Security Classification for Smart Grid Infra structures (long version)
Ctirad Sousedik
- Ctirad Sousedik, Ralph Breithaupt. Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography
- Ctirad Sousedik, Ralph Breithaupt, Patrick Bours. Classification of Fingerprints Captured Using Optical Coherence Tomography
Martin Stokkenes
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Christoph Busch. Feature Level Fused Templates for Multi-Biometric System on Smartphones
- Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch. Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
Martin Strand
- Kristian Gjøsteen, Martin Strand. A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability
- Martin Strand. Sikkert som banken
Bo Sun
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. Some Results on the Known Classes of Quadratic APN Functions
Jayachander Surbiryala
- Jayachander Surbiryala, Chunlei Li, Rong Chunming. A framework for improving security in cloud computing
- Jayachander Surbiryala. PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
- Bikash Agrawal, Jayachander Surbiryala, Rong Chunming. Resource Allocation in Cloud-Based Distributed Cameras
Adam Szekeres
- Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
- Vivek Agrawal, Adam Szekeres. CIRA Perspective on Risks Within UnRizkNow — A Case Study
Andrea Tenti
- Bjørn Ian Dundas, Andrea Tenti. Higher Hochschild homology is not a stable invariant
Shukun Tokas
- Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things
- Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Securing the Internet of Things
Kamer Vishi
- Kamer Vishi, Vasileios Mavroeidis. An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics
Gaute Wangen
- Gaute Wangen, Niclas Hellesen, Erlend Brækken, Henrik Torres. An Empirical Study of Root-Cause Analysis in Information Security Management
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas. User Modeling Validation Over the Security Awareness of Digital Natives
- Gaute Wangen. Cyber Security Risk Assessment Practices: Core Unified Risk Framework
- Gaute Wangen. Information Security Risk Assessment: A Method Comparison
- Vasileios Gkioulos, Gaute Wangen, Sokratis Katsikas, George Kavallieratos, Panayiotis Kotzanikolaou. Security Awareness of the Digital Natives
Pankaj Wasnik
- Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Christoph Busch. Robust Face Presentation Attack Detection On Smartphones: An Approach Based on Variable Focus
- Pankaj Shivdayal Wasnik, Katharina Schäfer, Raghavendra Ramachandra, Christoph Busch, Kiran Bylappa Raja. Fusing Biometric Scores Using Subjective Logic for Gait Recognition on Smartphone
- Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes. Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones
- Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch. Assessing Face Image Quality for Smartphone based Face Recognition System
Goitom Weldehawaryat
- Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem. Decentralised scheduling of power consumption in micro-grids: Optimisation and security
Shao-Fang Wen
- Shao-Fang Wen. Software Security in Open Source Development: A Systematic Literature Review
- Shao-Fang Wen, Stewart James Kowalski. A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
Tetiana Yarygina
- Christian W. Otterstad, Tetiana Yarygina. Low-Level Exploitation Mitigation by Diverse Microservices
- Tetiana Yarygina. RESTful Is Not Secure