Below you can see the research output generated by Ph.D. student members of COINS.
Mohamed Abomhara
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien, Vladimir Oleshchuk, Mohamed Hamid. Towards Risk-aware Access Control Framework for Healthcare Information Sharing
- Shada Abdullah AlSalamah, Hessah A. AlSalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Ali Saleh Abomhara, Ibrahim Alyahya. Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study
- Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
- Mohamed Ali Saleh Abomhara, Berglind Smaradottir, Geir Myrdahl Køien, Martin Gerdes. Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records
Vivek Agrawal
- Vivek Agrawal. Information Security Risk Management Practices- Community-Based Knowledge Sharing
- Vivek Agrawal, Einar Arthur Snekkenes. Secure Benchmarking using Electronic Voting
Jayachander Surbiryala
- Jayachander Surbiryala, Rong Chunming. Data Recovery and Security in Cloud
- Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
- Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
- Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools
Ramtin Aryan
- Ramtin Aryan, Anis Yazidi, Paal E. Engelstad. An Incremental Approach for Swift OpenFlow Anomaly Detection
- Ramtin Aryan, Anis Yazidi, Paal E. Engelstad. An Incremental Approach for Swift OpenFlow Anomaly Detection
Sergii Banin
- Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
- Sergii Banin, Geir Olav Dyrkolbotn. Multinomial malware classification via low-level features
Chris Carr
- Colin Alexander Boyd, Christopher Carr. Valuable Puzzles for Proofs-of-Work
Benjamin Chetioui
- Benjamin Chetioui. Production debugging note (SigSegv1 CTF)
- Benjamin Chetioui. Tree of life Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. On a pas les bases Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. Very personal portefolio Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. Doors of Durin Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. Fleet Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. ndash Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. icmp Writeup (Nuit Du Hack 2018)
- Benjamin Chetioui. Nice Code Writeup (ASIS CTF Quals 2018)
- Benjamin Chetioui. Wawacoin Writeup (Nuit du Hack Quals 2018)
- Benjamin Chetioui. gmx Writeup (Ångstrom CTF 2018)
- Benjamin Chetioui. Paddinganography: hiding data in baseN-encoded strings
- Benjamin Chetioui. Souper Strong Primes, Hidden Key and Soupstitution Writeups (EasyCTF IV)
- Benjamin Chetioui. Pixelly Writeup (EasyCTF IV)
- Benjamin Chetioui. BearShare 1 & 2 Writeup (AceBear Security Contest 2018)
- Benjamin Chetioui. Hello fibonacci? Writeup (AceBear Security Contest 2018)
- Benjamin Chetioui. VulnShop Writeup (Insomnihack Teaser 2018)
Ambika Chitrakar
- Ambika Shrestha Chitrakar, Slobodan Petrovic. Parallel k means clustering with triangle inequality on Spark
- Ambika Shrestha Chitrakar, Slobodan Petrovic. Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark
- Ambika Shrestha Chitrakar, Slobodan Petrovic. Collecting Network Evidence Using Constrained Approximate Search Algorithms
Peter Davis
- Peter Alexander Earls Davis. Biometric Profiling: Privacy, Security and the GDPR
Flávia Dias Casagrande
- Flavia Dias Casagrande, Jim Tørresen, Evi Zouganeli. Sensor Sequential Data Prediction
- Flavia Dias Casagrande, Evi Zouganeli. Occupancy and Daily Activity Event Modelling in Smart Homes for Older Adults with Mild Cognitive Impairment or Dementia
- Torhild Holthe, Flavia Dias Casagrande, Liv Halvorsrud, Anne Lund. The assisted living project: a process evaluation of implementation of sensor technology in community assisted living. A feasibility study
Samson Yoseph Esayas
- Samson Yoseph Esayas. Market Power in ‘Zero’ Price Markets and Competition in (Data) Privacy
- Samson Yoseph Esayas, Dan Jerker B. Svantesson. Digital Platforms under Fire – What Australia Can Learn from Recent Developments in Europe
- Samson Yoseph Esayas. Privacy as a Non-Price Competition Parameter: Theories of Harm in Mergers
- Samson Yoseph Esayas. THE SURVEILLANCE SOCIETY: For Profit Surveillance
- Samson Yoseph Esayas. The Commercialization of Personal Data and its Theoretical and Practical Implications for Data Privacy Law and Competition Law
- Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
- Samson Yoseph Esayas. The Commercialization of Personal Data and the Idea of Emergent Properties in Data Privacy Law
- Samson Yoseph Esayas. The Commercialization of Personal Data and its Implications for Data Privacy Law
- Samson Yoseph Esayas. Competition in (data) privacy: ‘zero’-price markets, market power, and the role of competition law
- Samson Yoseph Esayas, Angela Daly. The Proposed Australian Consumer Right to Access and Use Data: A European Comparison
Harsha Sandaruwan Gardiyawasam Pussewalage
- Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk. Blockchain Based Delegatable Access Control Scheme for a Collaborative E-health Environment
Vasileios Gkioulos
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski. Make it and Break it: An IoT Smart Home Testbed Case Study
- Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
- Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
- Vasileios Gkioulos. Securing Tactical Service Oriented Architectures
Håkon Gunleifsen
- Håkon Gunleifsen, Thomas Kemmerich. Security requirements for service function chaining isolation and encryption
- Vasileios Gkioulos, Håkon Gunleifsen, Goitom Kahsay Weldehawaryat. A Systematic Literature Review on Military Software Defined Networks
- Håkon Gunleifsen, Vasileios Gkioulos, Thomas Kemmerich. A Tiered Control Plane Model for Service Function Chaining Isolation
Cristina Heghedus
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Deep Learning For Short-Term Energy Load Forecasting Using Influential Factors
- Anton Shchipanov, Roman Berenblyum, Alexey A. Khrulenko, Lars Kollbotn, Rong Chunming, Cristina Viorica Heghedus, Fredrik Haugsand. Well Data Analytics: from Case Studies to Solutions
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Informatics Applicability; Machine Learning and Deep Learning
- Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Energy Load Forecasting Using Deep Learning
Debesh Jha
- Lasantha Bandara Thambawita Vajira, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen. The Medico-Task 2018: Disease detection in the gastrointestinal tract using global features and deep learning
- Vajira Thambawita, Debesh Jha, Michael Riegler, Pål Halvorsen, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen. The Medico-Task 2018: Disease Detection in the Gastrointestinal Tract using Global Features and Deep Learning
- Debesh Jha, Vajira Thambawita, Konstantin Pogorelov, Michael Riegler, Pål Halvorsen, Håvard D. Johansen, Dag Johansen. Automatic Disease Detection in Videos Recorded in the Gastrointestinal Tract
Yao Jiang
- Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang. Offline Assisted Group Key Exchange
Jan William Johnsen
- Jan William Johnsen, Katrin Franke. Digital Forensics Report for Dagens Næringsliv
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen. The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
- Jan William Johnsen, Katrin Franke. Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
Nikolay Kaleyski
- Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Soonhak Kwon, Constanza Susana Riera, Pantelimon Stanica. Partially APN Boolean functions
Nektaria Kaloudi
- Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?
Farzane Karami
- Farzane Karami, Olaf Owe, Toktam Ramezanifarkhani. An Evaluation of Interaction Paradigms for Active Objects
- Farzane Karami, Olaf Owe, Gerardo Schneider, Christian Johansen. The Future Mechanism and Information Flow Security
Ali Khodabakhsh
- Ali Khodabakhsh, Raghavendra Ramachandra, Christoph Busch. A Taxonomy of Audiovisual Fake Multimedia Content Creation Technology
- Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?
- Ali Khodabakhsh, Erwin Haasnoot, Patrick Bours. Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics
- Erwin Haasnoot, Ali Khodabakhsh, Chris Zeinstra, Luuk Spreeuwers, Raymond N.J. Veldhuis. FEERCI: A Package for Fast Non-Parametric Confidence Intervals for Equal Error Rates in Amortized O(m log n)
Benjamin Knox
- Ingrid Trolie Auestad, ingeborg Åse Horgen, Andrea Firth-Clark, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok, Ricardo Gregorio Lugo. Cognitive Profiles of Female Cyber Defence Operators
- Benjamin James Knox. The effect of cyberpower on institutional development in Norway
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and Application of the Hybrid Space App for Measuring Cognitive Focus in Hybrid Contexts
- Øyvind Jøsok, Mathias Hedberg, Benjamin James Knox, Kirsi Marjaana Helkala, Stefan Sütterlin, Ricardo Gregorio Lugo. Development and application of The Hybrid Space app for measuring cognitive focus in hybrid contexts
- Ricardo Lugo, Stefan Sütterlin, Øyvind Jøsok, Benjamin James Knox, Kirsi Marjaana Helkala. Macrocognitive approaches on Cyber Performance
- Stefan Sütterlin, Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark. An adaptation of the OODA-loop model in cyber operations: Implications for communication and training in a Hybrid Space
- Ricardo Lugo, Stefan Sütterlin, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Andrea Firth-Clark, Stian Iversen. Cognitive Styles of Cyber Engineers – A Cross Cultural Comparison
- Benjamin James Knox. A Pathway to Educating Cyberpower in the Norwegian Defence
- Benjamin James Knox. Hvorfor koble lederskap med cybermakt…?
- Øyvind Jøsok, Benjamin James Knox. Ledelse i cyberdomenet
- Kirsi Marjaana Helkala, Benjamin James Knox. Godalen vgs. er med på nasjonal dugnad i cyber-sikkerhet
- Benjamin James Knox, Ricardo Lugo, Kirsi Marjaana Helkala, Stefan Sütterlin, Øyvind Jøsok. Education for Cognitive Agility: Improved Understanding and Governance of Cyberpower
- Benjamin James Knox, Øyvind Jøsok, Kirsi Marjaana Helkala, Peter Khooshabeh, Terje Ødegaard, Ricardo Lugo, Stefan Sütterlin. Socio-technical communication: The Hybrid Space and the OLB-Model for science-based cyber education
- Ricardo Lugo, Kirsi Marjaana Helkala, Benjamin James Knox, Øyvind Jøsok, Natalie Marie Lande, Stefan Sütterlin. Interoceptive sensitivity as a proxy for emotional intensity and its relationship with perseverative cognition
Siddhartha Kumar
- Hsuan-Yin Lin, Siddhartha Kumar, Eirik Rosnes, Alexandre Graelli Amat. An MDS-PIR Capacity-Achieving Protocol for Distributed Storage Using Non-MDS Linear Codes
- Siddhartha Kumar, Alexandre Graell i Amat, Iryna Andriyanova, Fredrik Brannstrom, Eirik Rosnes. Code Constructions for Distributed Storage With Low Repair Bandwidth and Low Repair Complexity
- Siddhartha Kumar. Privacy, Security, and Repair in Distributed Storage Systems
Vasileios Mavroeidis
- Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang. A framework for data-driven physical security and insider threat detection
- Vasileios Mavroeidis, Audun Jøsang. Data-Driven Threat Hunting Using Sysmon
- Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen. Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
- Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang. The impact of quantum computing on present cryptography
Per Håkon Meland
- Karin Bernsmed, Per Håkon Meland, Martin Gilje Jaatun. Safety Critical Software and Security – How Low Can You Go?
- Harald Stolt-Nielsen, Trond Strøm, Yara Bayoumy, Per Håkon Meland. – Løsepengevirus er blitt en industri på det mørke nettet
- Per Håkon Meland, Yara Bayoumy. The Dark Economy of Ransomware
- Per Håkon Meland, Ingvald Garbo. Løsepengevirus
- Per Håkon Meland. Combining threat models with security economics
- Yara Bayoumy, Per Håkon Meland, Guttorm Sindre. A Netnographic Study on the Dark Net Ecosystem for Ransomware
- Per Håkon Meland, Fredrik Seehusen. When to Treat Security Risks with Cyber Insurance
- Ørnulf Jan Rødseth, Per Håkon Meland, Christian Frøystad, Ovidiu Valentin Drugan. PKI vs. Blockchain when Securing Maritime Operations
- Karin Bernsmed, Christian Frøystad, Per Håkon Meland, Dag Atle Nesheim, Ørnulf Jan Rødseth. Visualizing cyber security risks with bow-tie diagrams
Kalpanie Mendis
- Handunneththi V. Kalpanie Mendis. 5G enabling digitalization of the distribution grid
Maghsoud Morshedi Chinibolagh
- Maghsoud Morshedi, Josef Noll, Raheleh Kari. Building Trustable Remote Monitoring and Management Systems
- Raheleh Kari, Henrique Murilo Gaspar, Anne Haugen Gausdal, Maghsoud Morshedi. Human Interactions Framework for Remote Ship Operations
Romina Muka
- Radek Fujdiak, Petr Mlynek, Sergey Bezzateev, Romina Muka, Jan Slacik, Jiri Misurec, Ondrej Raso. Lightweight structures of big numbers for cryptographic primitives in limited devices
Dmytro Piatkivskyi
- Dmytro Piatkivskyi, Mariusz Nowostawski. Split payments in payment networks
Kyle Porter
- Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke. Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
- Kyle Porter, Slobodan Petrovic. Obtaining precision-recall trade-offs in fuzzy searches of large email corpora
- Kyle Porter. Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling
- Kyle Porter, Slobodan Petrovic. Obtaining Valuable Precision-Recall Trade-Offs for Fuzzy Searching Large E-mail Corpora
Ashish Rauniyar
- Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMA
- Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF Energy Harvesting and Information Transmission based on Power Splitting and NOMA for IoT Relay Systems
- Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. RF energy harvesting and information transmission based on NOMA for wireless powered IoT relay systems
- Ashish Rauniyar, Paal E. Engelstad, Hans Jonas Fossum Moen. A New Distributed Localization Algorithm Using Social Learning Based Particle Swarm Optimization for Internet of Things
- Ashish Rauniyar, Soo Young Shin. Cooperative spectrum sensing based on adaptive activation of energy and preamble detector for cognitive radio networks
- Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog
Patrick Schuch
- Patrick Schuch, Jan Marek May, Christoph Busch. Estimating the Data Origin of Fingerprint Samples
- Patrick Schuch, Jan Marek May, Christoph Busch. Unsupervised Learning of Fingerprint Rotations
- Patrick Schuch, Jan Marek May, Christoph Busch. Learning Neighbourhoods for Fingerprint Indexing
- Patrick Schuch. Survey on features for fingerprint indexing
Felix Schuckert
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg. Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
- Felix Schuckert, Max Hildner, Basel Katt, Hanno Langweg. Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox
Albin Severinson
- Lars Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes, Francisco Lázaro, Gianluigi Liva. A Droplet Approach Based on Raptor Codes for Distributed Computing with Straggling Servers
- Albin Severinson, Alexandre Graell i Amat, Eirik Rosnes. Block-diagonal coding for distributed computing with straggling servers
Andrii Shalaginov
- Andrii Shalaginov, Katrin Franke, Jan William Johnsen. The 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2018
- Joachim Hansen, Kyle Porter, Andrii Shalaginov, Katrin Franke. Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search
- Asif Iqbal, Andrii Shalaginov, Farhan Mahmood. Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks
- Asif Iqbal, Farhan Mahmood, Andrii Shalaginov, Mathias Ekstedt. Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems
- Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
- Andrii Shalaginov. Advancing Neuro-Fuzzy Algorithm for Automated Classification in Large-scale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic
Kashif Habib Sheikh
- Kashif Habib, Wolfgang Leister, Einar Arthur Snekkenes, Ilangko Balasingham. Context-Aware Adaptive Authentication for the IoT in eHealth
Manish Shrestha
- Ashish Rauniyar, Desta Haileselassie Hagos, Manish Shrestha. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog
Martin Stokkenes
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch. Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
- Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch. Baseline Evaluation of Smartphone based Finger-photo Verification System
- Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch. Biometric Transaction Authentication using Smartphones
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch. Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
Bo Sun
- Bo Sun, Sigurd Skogestad, Junguo Lu, Weidong Zhang. Dual SIMC-PI Controller Design for Cascade Implement of Input Resetting Control with Application
- Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nian Li, Bo Sun. On Upper Bounds for Algebraic Degrees of APN Functions
- Bo Sun, Lilya Budaghyan. On Classification and Some Properties of APN Functions
Jayachander Surbiryala
- Jayachander Surbiryala, Rong Chunming. Data Recovery and Security in Cloud
- Jayachander Surbiryala, Rong Chunming. Secure customer data over cloud forensic reconstruction
- Jayachander Surbiryala, Bikash Agrawal, Rong Chunming. Improve Security Over Multiple Cloud Service Providers for Resource Allocation
- Jayachander Surbiryala, Rong Chunming. Data recovery in cloud using forensic tools
Adam Szekeres
- Adam Szekeres, Einar Arthur Snekkenes. Unobtrusive Psychological Profiling for Risk Analysis
Shukun Tokas
- Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-Based Support for GDPR-Related Privacy Requirements
- Shukun Tokas, Toktam Ramezanifarkhani. Language-Based Support for GDPR-Related Privacy Requirements
- Toktam Ramezanifarkhani, Olaf Owe, Shukun Tokas. A secrecy-preserving language for distributed and object-oriented systems
Irene Villa
- Irene Villa. On APN functions L1(x3) + L2(x9) with linear L1 and L2
Kamer Vishi
- Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang. A framework for data-driven physical security and insider threat detection
- Nils Gruschka, Vasileios Mavroeidis, Kamer Vishi, Meiko Jensen. Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR
- Vasileios Mavroeidis, Kamer Vishi, Mateusz Zych, Audun Jøsang. The impact of quantum computing on present cryptography
Pankaj Wasnik
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Kiran Bylappa Raja, Christoph Busch. Subjective Logic Based Score Level Fusion: Combining Faces and Fingerprints
- Raghavendra Ramachandra, Sushma Venkatesh, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch. Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection
- Pankaj Shivdayal Wasnik, Martin Stokkenes, Mihkal Dunfjeld, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch. Baseline Evaluation of Smartphone based Finger-photo Verification System
- Pankaj Shivdayal Wasnik, Raghavendra Ramachandra, Martin Stokkenes, Kiran B. Raja, Christoph Busch. Improved Fingerphoto Verification System Using Multi-scale Second Order Local Structures
- Tommy Arild Garden Thorsen, Pankaj Shivdayal Wasnik, Christoph Busch, Raghavendra Ramachandra, Kiran Bylappa Raja. Assessing Face Image Quality with LSTMs
- Ali Khodabakhsh, Raghavendra Ramachandra, Kiran Bylappa Raja, Pankaj Shivdayal Wasnik, Christoph Busch. Fake Face Detection Methods: Can They Be Generalized?
- Jag Mohan Singh, Pankaj Shivdayal Wasnik, Raghavendra Ramachandra. Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU
Shao-Fang Wen
- Shao-Fang Wen, Basel Katt. An Ontology-Based Context Model for Managing Security Knowledge in Software Development
- Shao-Fang Wen. An Empirical Study on Security Knowledge Sharing and Learning in Open Source Software Communities
- Shao-Fang Wen. Software Security Knowledge Transferring and Learning with Concept Maps
- Shao-Fang Wen. Learning Secure Programming in Open Source Software Communities: A Socio-Technical View
Muhammad Mudassar Yamin
- Muhammad Mudassar Yamin, Basel Katt. Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper
- Muhammad Mudassar Yamin, Basel Katt. Detecting Malicious Windows Commands Using Natural Language Processing Techniques
- Muhammad Mudassar Yamin, Basel Katt. Modelling and Analyzing Attack-Defense Scenarios for Cyber-Ranges
- Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos, Torseth Espen, Stewart James Kowalski. Make it and Break it: An IoT Smart Home Testbed Case Study
Tetiana Yarygina
- Tetiana Yarygina, Christian W. Otterstad. A Game of Microservices: Automated Intrusion Response
- Tetiana Yarygina, Anya Helene Bagge. Overcoming Security Challenges in Microservice Architectures
- Tetiana Yarygina, Anya Helene Bagge, Jaakko Timo Henrik Järvi. Exploring Microservice Security
Jin Zhang
- Jingyue Li, Jin Zhang, Nektaria Kaloudi. Could We Issue Driving Licenses to Autonomous Vehicles?
Xiaojie Zhu
- Ping Shen, Chi Chen, Xiaojie Zhu. Privacy-preserving relevance ranking scheme and its application in multi-keyword searchable encryption