Background and activities
- IMT4124 - Cryptology
- IMT6051 - Wireless Communication Security
- IMT6041 - Selected Topics in Cryptology
- IMT4204 - Intrusion Detection in Physical and Virtual Networks
- IMT6031 - Intrusion Detection and Prevention
- IMT4205 - Research Project Planning
- IMT6081 - Modern Cryptology
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2022) Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field. Journal of Field Robotics (JFR).
- (2021) Secure and Efficient Transmission of Vision-Based Feedback Control Signals. Journal of Intelligent and Robotic Systems. vol. 103.
- (2020) Constrained Approximate Search Algorithms in Knowledge Discovery. Modern Information Technologies and IT-Education.
- (2019) Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce. Ingénierie des Systèmes d'Information. vol. 24 (4).
- (2018) Collecting Network Evidence Using Constrained Approximate Search Algorithms. IFIP Advances in Information and Communication Technology. vol. 532.
- (2018) Obtaining precision-recall trade-offs in fuzzy searches of large email corpora. IFIP Advances in Information and Communication Technology. vol. 532.
- (2017) On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 11.
- (2016) Constrained Row-Based Bit-Parallel Search in Intrusion Detection. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2016) An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2016.
- (2015) Approximate search with constraints on indels with application in SPAM filtering. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2013) Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Logic Journal of the IGPL. vol. 21 (4).
- (2011) Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. International Journal on Mobile Computing and Multimedia Communications. vol. 3 (1).
- (2011) On General Definition of L1-norm Support Vector Machines for Feature Selection. International Journal of Machine Learning and Computing. vol. 1 (3).
- (2009) A New Two-Stage Search Procedure for Misuse Detection. International Journal of Security and Its Applications. vol. 3 (3).
Part of book/report
- (2019) Efficient k-means Using Triangle Inequality on Spark for Cyber Security Analytics. IWSPA '19 Proceedings of the ACM International Workshop on Security and Privacy Analytics.
- (2018) Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark. 2018 IEEE International Conference on Big Data (Big Data), Seattle, 10-13 Dec. 2018.
- (2018) Approximate Search in Digital Forensics. Computer and Network Security Essentials.
- (2017) CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers.
- (2014) Cloud Password Manager Using Privacy-Preserved Biometrics. Proceedings of IEEE International Conference on Cloud Engineering (IC2E 2014); 10–14 March 2014, Boston, Massachusetts.
- (2013) Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow. Emerging Management Mechanisms for the Future Internet. 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings.