Background and activities
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2016) Evidential Reasoning for Forensic Readiness. The Journal of Digital Forensics, Security and Law. vol. 11 (1).
- (2006) Malware Attacks on Eletronic Signatures Revisited. Lecture Notes in Informatics. vol. 77.
Part of book/report
- (2017) One Click Privacy for Online Social Networks. Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings.
- (2017) Agile Test Automation for Web Applications - A Security Perspective. Empirical Research for Software Security: Foundations and Experience.
- (2017) Source Code Patterns of SQL Injection Vulnerabilities. ARES'17. Proceedings of The 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy — August 29 - September 01, 2017.
- (2015) Privacy Points as a Method to Support Privacy Impact Assessments. Proceedings of the 1st International Workshop on Technical and Legal Aspects of Data Privacy and Security (TELERISE 2015).
- (2015) Developing Metrics for Surveillance Impact Assessment. 39th IEEE Annual Computer Software and Applications Conference.
- (2015) Events and causal factors charting of kernel traces for root cause analysis. 20th IEEE Symposium on Computers and Communications (ISCC).
- (2014) Cost-benefit analysis of kernel tracing systems for forensic readiness. Proceedings of the 2nd international workshop on Security and forensics in communication systems.
- (2014) Process Tracking for Forensic Readiness. Secure IT Systems; 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings.
- (2014) Resource-Based Event Reconstruction of Digital Crime Scenes. Proceedings of 2014 IEEE Joint Intelligence and Security Informatics Conference.
- (2014) AccountabilityFS: A File System Monitor for Forensic Readiness. Proceedings of 2014 IEEE Joint Intelligence and Security Informatics Conference.
- (2013) A Survey of Process Activity Tracking Systems. Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse - NISK 2013 - Stavanger, 18th-20th November 2013.
- (2012) Firewalls und Virenscanner auf mobilen Plattformen. DACH Security 2012.
- (2012) Security Add-Ons for Mobile Platforms. Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 – November 2, 2012. Proceedings.
- (2012) Cost-Effective Technical Countermeasures Against GUI Manipulation of .NET Programs. NordSec 2012, Short-Paper Proceedings, The 17th Nordic Conference on Secure IT Systems; Karlskrona, Sweden, 31 October - 2 November 2012.
- (2012) Modifying Java and .NET Processes in Memory. Norwegian Information Security Conference Norsk Informasjonssikkerhetskonferanse, NISK 2012; University of Nordland, Bodø; 19-21 November 2012.
- (2012) Civil Law Concepts in Access Control. IRIS 2012. Transformation juristischer Sprachen/ Transformation of Legal Languages. Tagungsband des 15. Internationale Rechtsinformatik Symposion/ Proceedings of the 15th International Legal Informatics Symposium.
- (2012) Information Security Aspects of the 22/7 Attacks. EISIC 2012, Proceedings of European Intelligenceand Security Informatics Conference; Odense, Denmark;22–24 August 2012.
- (2012) OOXML File Analysis of the July 22nd Terrorist Manual. Communications and Multimedia Security 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings.