Background and activities
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2018) Collecting Network Evidence Using Constrained Approximate Search Algorithms. IFIP Advances in Information and Communication Technology. vol. 532.
- (2018) Obtaining precision-recall trade-offs in fuzzy searches of large email corpora. IFIP Advances in Information and Communication Technology. vol. 532.
- (2017) On Application of Constrained Edit Distance Algorithms to Cryptanalysis and Digital Forensics. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 11.
- (2016) Constrained Row-Based Bit-Parallel Search in Intrusion Detection. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2016) An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2016.
- (2015) Approximate search with constraints on indels with application in SPAM filtering. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2013) Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Logic journal of the IGPL (Print). vol. 21 (4).
- (2011) Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. International Journal on Mobile Computing and Multimedia Communications. vol. 3 (1).
- (2011) On General Definition of L1-norm Support Vector Machines for Feature Selection. International Journal of Machine Learning and Computing. vol. 1 (3).
- (2009) A New Two-Stage Search Procedure for Misuse Detection. International Journal of Security and Its Applications. vol. 3 (3).
Part of book/report
- (2018) Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark. 2018 IEEE International Conference on Big Data (Big Data), Seattle, 10-13 Dec. 2018.
- (2018) Approximate Search in Digital Forensics. Computer and Network Security Essentials.
- (2017) CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns. Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers.
- (2014) Cloud Password Manager Using Privacy-Preserved Biometrics. Proceedings of IEEE International Conference on Cloud Engineering (IC2E 2014); 10–14 March 2014, Boston, Massachusetts.
- (2013) Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow. Emerging Management Mechanisms for the Future Internet. 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings.
- (2012) Feature Extraction Methods for Intrusion Detection Systems. Threats, Countermeasures, and Advances in Applied Information Security.
- (2012) Reliability in A Feature-Selection Process for Intrusion Detection. Reliable Knowledge Discovery.
- (2012) Security properties of oscillator rings in true random number generators. Proceedings of the IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS); April 18-20, 2012; Tallinn, Estonia.
- (2011) Towards a Biometric Random Number Generator - A General Approach For True Random Extraction From Biometric Samples. BIOSIG 2011, Proceedings - International Conference of the Biometrics Special Interest Group; 8.-9. September 2011 in Darmstadt.
- (2011) A General L1-norm Support Vector Machine for Feature Selection. Proceedings of 2011 3rd International Conference on Machine Learning and Computing.