Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Aida Akbarzadeh

  1. Aida Akbarzadeh, Pankaj Pandey, Sokratis Katsikas. Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
  2. Aida Akbarzadeh, Sokratis Katsikas. Identifying Critical Components in Large Scale Cyber Physical Systems

Ahmed Amro

  1. Ahmed Walid Amro. IoT Vulnerability Scanning: A State of the Art
  2. Ahmed Walid Amro, Georgios Kavallieratos, Konstantinos Louzis, Christoph Alexander Thieme. Impact of cyber risk on the safety of the MilliAmpere2 Autonomous Passenger Ship
  3. Ahmed Walid Amro, Muhammad Mudassar Yamin, Benjamin James Knox. Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
  4. Ahmed Walid Amro, Vasileios Gkioulos, Sokratis Katsikas. Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation

Ramtin Aryan

  1. Ramtin Aryan, Anis Yazidi, Adel Bouhoula, Paal E. Engelstad. Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomalies
  2. Ramtin Aryan, Anis Yazidi, Øivind Kure, Paal E. Engelstad. A parallel approach for detecting OpenFlow rule anomalies based on a general formalism

Siri Bromander

  1. Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjøtskift, Fredrik Borg. Modeling Cyber Threat Intelligence
  2. Siri Bromander, Lilly Pijnenburg Muller, Martin Eian, Audun Jøsang. Examining the “Known Truths” in Cyber Threat Intelligence – The Case of STIX

Benjamin Chetioui

  1. Mathilde Boltenhagen, Benjamin Chetioui, Laurine Huber. An Alignment Cost-Based Classification of Log Traces Using Machine-Learning
  2. Alessandro Budroni, Benjamin Chetioui, Ermes Franch. Attacks on Integer-RLWE

Peter Davis

  1. Peter Alexander Earls Davis, Luca Tosoni. The EU Cyber Legal Framework
  2. Peter Alexander Earls Davis, Luca Tosoni. Cybercrime Law and Crypto Wars: International Perspectives
  3. Peter Alexander Earls Davis. Facial Detection and Smart Billboards: Analysing the ‘Identified’ Criterion of Personal Data in the GDPR

Samson Yoseph Esayas

  1. Samson Yoseph Esayas. Privacy as a Non-Price Parameter: Implications for the Interface between Data Privacy & Competition Law

Ali Esmaeily

  1. Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski. 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept
  2. Ali Esmaeily, Katina Kralevska, Danilo Gligoroski. A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G

Muhammad Ali Fauzi

  1. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang. Comparative analysis of machine learning methods for analyzing security practice in electronic health records’ logs.
  2. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang. Workflow-based anomaly detection using machine learning on electronic health records’ logs: A Comparative Study
  3. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies
  4. Muhammad Ali Fauzi, Bian Yang. Audiouth: Multi-factor Authentication Based on Audio Signal
  5. Muhammad Ali Fauzi, Patrick Bours. Ensemble Method for Sexual Predators Identification in Online Chats
  6. Muhammad Ali Fauzi. 2020 8th International Workshop on Biometrics and Forensics (IWBF)
  7. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN Based Honeywords System for Machine-Generated Passwords Database
  8. Muhammad Ali Fauzi. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)
  9. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness
  10. Muhammad Ali Fauzi. 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
  11. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN-Based Honeywords System

Marija Gajic

  1. Marija Gajic, Marija Furdek, Poul Einar Heegaard. A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery

Herman Galteland

  1. Gareth Thomas Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang. Cloud-assisted Asynchronous Key Transport with Post-Quantum Security

Cristina Heghedus

  1. Cristina Viorica Heghedus, Antorweep Chakravorty, Rong Chunming. Deep Learning for Short-Term Energy Load Forecasting Using Influential Factors
  2. Cristina Viorica Heghedus, Rong Chunming. Artificial Intelligence Models Used for Prediction in the Energy Internet

Martha Norberg Hovd

  1. Martha Norberg Hovd, Martijn Stam. Vetted Encryption

Debesh Jha

  1. Debesh Jha, Steven Hicks, Krister Emanuelsen, Håvard D. Johansen, Dag Johansen, Thomas de Lange, Michael Riegler, Pål Halvorsen. Medico Multimedia Task at MediaEval 2020: Automatic Polyp Segmentation
  2. Steven Hicks, Debesh Jha, Konstantin Pogorelov, Alba Garcia Seco de Herrera, Dmitry Bogdanov, Pierre-Etienne Martin, Stelios Andreadis, Minh-Son Dao, Zhuoran Liu, José Vargas-Quirós, Benjamin Kille, Martha Larson. Working Notes Proceedings of the MediaEval 2020 Workshop
  3. Debesh Jha, Anis Yazidi, Michael Alexander Riegler, Dag Johansen, Håvard D. Johansen, Pål Halvorsen. LightLayers: Parameter Efficient Dense and Convolutional Layers for Image Classification
  4. Tobias Ross, Annika Reinke, Peter M. Full, Martin Wagner, Hannes Kenngott, Martin Apitz, Hellena Hempe, Diana Mindroc Filimon, Patrick Scholz, Thuy Nuong Tran, Pierangela Bruno, Pablo Arbeláez, Gui-Bin Bian, Sebastian Bodenstedt, Jon Lindström Bolmgren, Laura Bravo-Sánchez, Hua-Bin Chen, Cristina González, Dong Guo, Pål Halvorsen, Pheng-Ann Heng, Enes Hosgor, Zeng-Guang Hou, Fabian Isensee, Debesh Jha, Tingting Jiang, Yueming Jin, Kadir Kirtac, Sabrina Kletz, Stefan Leger, Zhixuan Li, Klaus H. Maier-Hein, Zhen-Liang Ni, Michael Riegler, Klaus Schoeffmann, Ruohua Shi, Stefanie Speidel, Michael Stenzel, Isabell Twick, Gutai Wang, Jiacheng Wang, Liansheng Wang, Lu Wang, Yujie Zhang, Yan-Jie Zhou, Lei Zhu, Manuel Wiesenfarth, Annette Kopp-Schneider, Beat P. Müller-Stich, Lena Maier-Hein. Comparative validation of multi-instance instrument segmentation in endoscopy: results of the ROBUST-MIS 2019 challenge
  5. Debesh Jha, Michael Alexander Riegler, Dag Johansen, Pål Halvorsen, Håvard D. Johansen. DoubleU-Net: A Deep Convolutional Neural Network for Medical Image Segmentation
  6. Vajira Lasantha Bandara Thambawita, Debesh Jha, Hugo Lewi Hammer, Håvard D. Johansen, Dag Johansen, Pål Halvorsen, Michael Riegler. An extensive study on cross-dataset bias and evaluation metrics interpretation for machine learning applied to gastrointestinal tract abnormality classification
  7. Hanna Borgli, Vajira Lasantha Bandara Thambawita, Pia Smedsrud, Steven Hicks, Debesh Jha, Sigrun Losada Eskeland, Kristin Ranheim Randel, Konstantin Pogorelov, Mathias Lux, Duc Tien Dang Nguyen, Dag Johansen, Carsten Griwodz, Håkon Kvale Stensland, Enrique Garcia-Ceja, Peter T Schmidt, Hugo Lewi Hammer, Michael Riegler, Pål Halvorsen, Thomas de Lange. HyperKvasir, a comprehensive multi-class image and video dataset for gastrointestinal endoscopy
  8. Vajira Lasantha Bandara Thambawita, Steven Hicks, Hanna Borglia, Håkon Kvale Stensland, Debesh Jha, Martin Kristoffer Svensen, Svein Arne Pettersen, Dag Johansen, Håvard D. Johansen, Susann Dahl Pettersen, Simon Nordvang, Sigurd Pedersen, Anders Tungeland Gjerdrum, Tor-Morten Grønli, Per Morten Fredriksen, Ragnhild Eg, Kjeld S. Hansen, Siri Fagernes, Christine Claudi-Nielsen, Andreas Biørn-Hansen, Duc Tien Dang Nguyen, Tomas Kupka, Hugo Lewi Hammer, Ramesh Jain, Michael Riegler, Pål Halvorsen. PMData: a sports logging dataset
  9. Debesh Jha, Pia Smedsrud, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen. Kvasir-SEG: A segmented polyp dataset
  10. Debesh Jha, Smedsrud Pia H, Michael Riegler, Pål Halvorsen, Thomas de Lange, Dag Johansen, Håvard D. Johansen. Kvasir-SEG: A Segmented Polyp Dataset

Yao Jiang

  1. Yao Jiang. The Direction of Updatable Encryption Does Not Matter Much
  2. Colin Alexander Boyd, Gareth Thomas Davies, Kristian Gjøsteen, Yao Jiang. Fast and Secure Updatable Encryption
  3. Gareth Thomas Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang. Cloud-assisted Asynchronous Key Transport with Post-Quantum Security

Johanna Johansen

  1. Johanna Johansen, Simone Fischer-Hübner. Making GDPR usable: A model to support usability evaluations of privacy
  2. Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll. Tool Support for Security Classification for Internet of Things (long version)

Jan William Johnsen

  1. Jan William Johnsen, Katrin Franke. Identifying Proficient Cybercriminals Through Text and Network Analysis

Nikolay Kaleyski

  1. Lilya Budaghyan, Tor Helleseth, Nikolay Stoyanov Kaleyski. A New Family of APN Quadrinomials
  2. Lilya Budaghyan, Claude Michael Carlet, Tor Helleseth, Nikolay Stoyanov Kaleyski. On the Distance Between APN Functions
  3. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stanica. On the sensitivity of some permutation APN functions to swapping points
  4. Yuyin Yu, Nikolay Stoyanov Kaleyski, Lilya Budaghyan, Yongqiang Li. Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9
  5. Lilya Budaghyan, Nikolay Stoyanov Kaleyski, Constanza Susana Riera, Pantelimon Stănică. Partially APN functions with APN-like polynomial representations

Nektaria Kaloudi

  1. Nektaria Kaloudi, Jingyue Li. The AI-based cyber threat landscape: A survey

Farzane Karami

  1. Farzane Karami, Olaf Owe, Gerardo Schneider. Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures. In Proceedings of The 25th Nordic Conference on Secure IT Systems (NortdSec 2020). To appear in Lecture Notes in Computer Science (17 pages)

Ali Khodabakhsh

  1. Thomas Nielsen, Ali Khodabakhsh, Christoph Busch. Unit-Selection Based Facial Video Manipulation Detection
  2. Ali Khodabakhsh, Hugo Loiselle. Action-Independent Generalized Behavioral Identity Descriptors for Look-alike Recognition in Videos
  3. Ali Khodabakhsh, Christoph Busch. A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling

Benjamin Knox

  1. Ahmed Walid Amro, Muhammad Mudassar Yamin, Benjamin James Knox. Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
  2. Ricardo Gregorio Lugo, Benjamin James Knox, Øyvind Jøsok, Stefan Sütterlin. Variable Self-efficacy as a Measurement for Behaviors in Cyber Security Operations
  3. Sjur Johansen Øfsteng, Ina Garthe, Øyvind Jøsok, Silje Knox, Kirsi Marjaana Helkala, Benjamin James Knox, Stian Ellefsen, Bent Rønnestad. No effect of increasing protein intake during military exercise with severe energy deficit on body composition and performance

Edlira Martiri

  1. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies
  2. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN Based Honeywords System for Machine-Generated Passwords Database
  3. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness
  4. Muhammad Ali Fauzi, Bian Yang, Edlira Martiri. PassGAN-Based Honeywords System

Per Håkon Meland

  1. Ørnulf Jan Rødseth, Christian Frøystad, Per Håkon Meland, Karin Bernsmed, Dag Atle Nesheim. The need for a public key infrastructure for automated and autonomous ships
  2. Kristian Haga, Per Håkon Meland, Guttorm Sindre. Breaking the Cyber Kill Chain by Modelling Resource Costs
  3. Per Håkon Meland, Yara Bayoumy, Guttorm Sindre. The Ransomware-as-a-Service economy within the darknet
  4. Per Håkon Meland, Guttorm Sindre. Cyber Attacks for Sale

Sara Mohammadi

  1. Sara Mohammadi, Frank Eliassen, Yan Zhang. Effects of false data injection attacks on a local P2P energy trading market with prosumers

Maghsoud Morshedi Chinibolagh

  1. Maghsoud Morshedi Chinibolagh, Josef Alfons Noll. A Survey on Prediction of PQoS Using Machine Learning on Wi-Fi Networks
  2. Maghsoud Morshedi. Preparing Wi-Fi Networks for Novel Services in Smart Infrastructure

Romina Muka

  1. Romina Muka. Causes of Information Inconsistencies in Smart Distribution Grids

Livinus Obiora Nweke

  1. Anthony Junior Bokolo, Livinus Obiora Nweke, Mohammed A. Al‑Sharafi. Applying software‑defined networking to support telemedicine health consultation during and post Covid‑19 era
  2. Livinus Obiora Nweke, Stephen Wolthusen. Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
  3. Livinus Obiora Nweke, Stephen Wolthusen. Resilience Analysis of Software-Defined Networks Using Queueing Networks
  4. Ankur Shukla, Basel Katt, Livinus Obiora Nweke. Vulnerability Discovery Modelling With Vulnerability Severity
  5. Livinus Obiora Nweke, Goitom Kahsay Weldehawaryat, Stephen Wolthusen. Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
  6. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes. Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  7. Livinus Obiora Nweke, Stephen Wolthusen. Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection
  8. Livinus Obiora Nweke, Stephen Wolthusen. Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection
  9. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang. Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices
  10. Livinus Obiora Nweke, Stephen Wolthusen. A Review of Asset-Centric Threat Modelling Approaches

Aybars Oruc

  1. Aybars Oruc. Claims of State-Sponsored Cyberattack in the Maritime Industry

Kyle Porter

  1. Rune Nordvik, Kyle Porter, Fergus Toolan, Stefan Axelsson, Katrin Franke. Generic Metadata Time Carving

Ashish Rauniyar

  1. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Exploiting SWIPT for IoT NOMA-based Diamond Relay Networks
  2. Ashish Rauniyar, Anis Yazidi, Paal E. Engelstad, Olav Norvald Østerbø. A Reinforcement Learning based Game Theoretic Approach for Distributed Power Control in Downlink NOMA
  3. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. An Adaptive User Pairing Strategy for Uplink Non-Orthogonal Multiple Access
  4. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Ergodic Capacity Performance of D2D IoT Relay NOMA-SWIPT Systems with Direct Links
  5. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Ergodic Capacity Performance of NOMA-SWIPT Aided IoT Relay Systems with Direct Link
  6. Ramesh Upreti, Ashish Rauniyar, Jeevan Kunwar, Hårek Haugerud, Paal E. Engelstad, Anis Yazidi. Adaptive Pursuit Learning for Energy‐efficient Target Coverage in Wireless Sensor Networks
  7. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. On the Performance of Bidirectional NOMA-SWIPT Enabled IoT Relay Networks
  8. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Ergodic Sum Capacity Analysis of NOMA‐SWIPT Enabled IoT Relay Systems
  9. Ashish Rauniyar, Paal E. Engelstad, Olav Norvald Østerbø. Capacity Enhancement of NOMA‐SWIPT IoT Relay System with Direct Links over Rayleigh Fading Channels

Magnus Ringerud

  1. Jiaxin Pan, Magnus Ringerud. Signatures with Tight Multi-user Security from Search Assumptions

Felix Schuckert

  1. Felix Schuckert, Basel Katt, Hanno Langweg. Difficult XSS Code Patterns for Static Code Analysis Tools

Albin Severinson

  1. Lars Albin Severinson, Eirik Rosnes, Alexandre Graell i Amat. Coded Distributed Tracking

Manish Shrestha

  1. Manish Shrestha, Christian Johansen, Josef Noll. Criteria for security classification of smart home energy management systems
  2. Manish Shrestha, Christian Johansen, Josef Noll. Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT
  3. Manish Shrestha, Christian Johansen, Maunya D. Moghadam, Johanna Johansen, Josef Noll. Tool Support for Security Classification for Internet of Things (long version)
  4. Manish Shrestha, Christian Johansen, Josef Noll. Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
  5. Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso. A Methodology for Security Classification applied to Smart Grid Infrastructures

Adam Szekeres

  1. Adam Szekeres, Einar Arthur Snekkenes. Representing decision-makers in SGAM-H: the Smart Grid Architecture Model Extended with the Human Layer
  2. Adam Szekeres, Einar Arthur Snekkenes. Construction of Human Motivational Profiles by Observation for Risk Analysis

Balint Teglasy

  1. Bálint Zoltán Téglásy, Bjørn Axel Gran, Sokratis Katsikas, Vasileios Gkioulos, Mary Ann Lundteigen. Clarification of the Cybersecurity and Functional Safety Interrelationship in Industrial Control Systems: Barrier Concepts and Essential Functions

Shukun Tokas

  1. Shukun Tokas, Olaf Owe. A Formal Framework for Consent Management
  2. Shukun Tokas, Olaf Owe, Toktam Ramezanifarkhani. Language-based mechanisms for privacy-by-design
  3. Shukun Tokas, Olaf Owe, Christian Johansen. Code Diversification Mechanisms for Internet of Things (Revised Version 2)

Worku Gedefa Urgessa

  1. Worku Gedefa Urgessa. Multilateral cybersecurity governance: Divergent conceptualizations and its origin

Irene Villa

  1. Marco Calderini, Irene Villa. On the Boomerang Uniformity of some Permutation Polynomials
  2. Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa. Constructing APN functions through isotopic shifts
  3. Lilya Budaghyan, Marco Calderini, Claude Michael Carlet, Robert Coulter, Irene Villa. Generalized isotopic shift construction for APN functions
  4. Lilya Budaghyan, Marco Calderini, Irene Villa. On equivalence between known families of quadratic APN functions

Shao-Fang Wen

  1. Shao-Fang Wen. A Multi-Discipline Approach for Enhancing Developer Learning in Software Security
  2. Mazaher Kianpour, Shao-Fang Wen. Timing Attacks on Machine Learning: State of the Art

Shuang Wu

  1. shuang wu, Kristian Gjøsteen, Colin Alexander Boyd. A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract

Muhammad Mudassar Yamin

  1. Mats Seljeseth, Muhammad Mudassar Yamin, Basel Katt. UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices
  2. Ahmed Walid Amro, Muhammad Mudassar Yamin, Benjamin James Knox. Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study
  3. Muhammad Mudassar Yamin, Andrii Shalaginov, Basel Katt. Smart Policing for a Smart World Opportunities, Challenges and Way Forward

Prosper Yeng

  1. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang. Comparative analysis of machine learning methods for analyzing security practice in electronic health records’ logs.
  2. Prosper Yeng, Muhammad Ali Fauzi, Bian Yang. Workflow-based anomaly detection using machine learning on electronic health records’ logs: A Comparative Study
  3. Prosper Yeng, Stephen D. Wolthusen, Bian Yang. Comparative analysis of software development methodologies for security requirement analysis: Towards healthcare security practice
  4. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang. Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice
  5. Prosper Yeng, Stephen Dirk Bjørn Wolthusen, Bian Yang. Legal requirements toward enhancing the security of medical devices
  6. Prosper Yeng, Ashenafi Zebene Woldaregay, Terje Geir Solvoll, Gunnar Hartvigsen. Cluster detection mechanisms for syndromic surveillance systems: Systematic review and framework development
  7. Prosper Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes. Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
  8. Livinus Obiora Nweke, Prosper Yeng, Stephen Wolthusen, Bian Yang. Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices

Jin Zhang

  1. Jin Zhang, Jingyue Li. Testing and verification of neural-network-based safety-critical control software: A systematic literature review

Grethe Østby

  1. Grethe Østby, Stewart James Kowalski, Basel Katt. Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
  2. Grethe Østby, Stewart James Kowalski. Preparing for cyber crisis management exercises
  3. Grethe Østby, Kieren N. Lovell, Basel Katt. EXCON Teams in Cyber Security Training
  4. Grethe Østby, Basel Katt. Maturity Modelling to Prepare for Cyber Crisis Escalation and Management
  5. Philip Johannes Brugmans Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby. The Root Causes of Compromised Accounts at the University