SEC - Digital Security

Publications 2012-2023

2023

A framework for analyzing authentication risks in account networks. Pöhn, Daniela; Gruschka, Nils; Ziegler, Leonhard & Büttner, Andre. 2023, Computers & Security. https://doi.org/10.1016/j.cose.2023.103515 (Academic article)

Business Language for Information Security. Tran, Dinh Uy & Jøsang, Audun. 2023, None. https://doi.org/10.1007/978-3-031-38530-8_14 (Academic chapter/article/Conference paper)

CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML. Selimi, Synim; Rexha, Blerim & Vishi, Kamer. 2023, International Journal of Information and Computer Security. https://doi.org/10.1504/IJICS.2023.133385 (Academic article)

Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History. Bucko, Ahmet; Vishi, Kamer; Krasniqi, Bujar & Rexha, Blerim. 2023, Computers. https://doi.org/10.3390/computers12040078 (Academic article)

Interactive Web-Based Visual Analysis on Network Traffic Data. Jeong, Dong Hyun; Cho, Jin-Hee; Chen, Feng; Kaplan, Lance; Jøsang, Audun & Ji, Soo-Yeon. 2023, Information. https://doi.org/10.3390/info14010016 (Academic article)

Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. Zennaro, Fabio Massimo & Erdodi, Laszlo Tibor. 2023, IET Information Security. https://doi.org/10.1049/ise2.12107 (Academic article)

Protecting FIDO Extensions Against Man-in-the-Middle Attacks. Büttner, Andre & Gruschka, Nils. 2023, Springer. https://doi.org/10.1007/978-3-031-25467-3_5 (Academic chapter/article/Conference paper)

Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. Sommervoll, Åvald Åslaugson; Erdodi, Laszlo Tibor & Zennaro, Fabio Massimo. 2023, International Journal of Information Security. https://doi.org/10.1007/s10207-023-00738-3 (Academic article)

2022

A Policy Language to Capture Compliance of Data Protection Requirements. Baramashetru, Chinmayi; Tapia Tarifa, Silvia Lizeth; Owe, Olaf & Gruschka, Nils. 2022, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-031-07727-2_16 (Academic article)

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. Erdodi, Laszlo; Kaliyar, Pallavi; Houmb, Siv Hilde; Akbarzadeh, Aida & Waltoft-Olsen, Andrè Jung. 2022, Association for Computing Machinery (ACM). https://doi.org/10.1145/3538969.3544475 (Academic chapter/article/Conference paper)

Digital security in the Norwegian power systems' supply chains. Moen, Sina Rebekka; Selnes, Sigrid Haug; Hagen, Janne Merete & Njå, Ove. 2022, Research Publishing Services. https://doi.org/10.3850/978-981-18-5183-4_R08-06-443-cd (Academic chapter/article/Conference paper)

Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications. Thaqi, Rrezearta; Vishi, Kamer & Rexha, Blerim. 2022, Journal of Applied Security Research. https://doi.org/10.1080/19361610.2022.2096387 (Academic article)

Information Security Posture to Organize and Communicate the Information Security Governance Program. Tran, Dinh Uy & Jøsang, Audun. 2022, Academic Conferences International (ACI). https://doi.org/https://doi.org/10.34190/ecmlg.18.1.729 (Academic chapter/article/Conference paper)

LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack. Kaliyar, Pallavi; Erdodi, Laszlo & Katsikas, Sokratis. 2022, International Academy, Research and Industry Association (IARIA). (Academic chapter/article/Conference paper)

Multi-Account Dashboard for Authentication Dependency Analysis. Pöhn, Daniela; Gruschka, Nils & Ziegler, Leonhard. 2022, Association for Computing Machinery (ACM). https://doi.org/10.1145/3538969.3538987 (Academic chapter/article/Conference paper)

Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. Yamin, Muhammad Mudassar; Erdodi, Laszlo Tibor; Torseth, Espen & Katt, Basel. 2022, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-031-05457-0_24 (Academic article)

The Effect of Regulation and Audits on Implementation of Cybersecurity Controls in Norwegian Grid Companies.. Storm, Jon-Martin; Hagen, Janne Merete & Selnes, Sigrid Haug. 2022, Research Publishing Services. https://doi.org/10.3850/978-981-18-5183-4_R09-03-295-cd (Academic chapter/article/Conference paper)

2021

Machine Learning for Offensive Cyber Operations. Sommervoll, Åvald Åslaugson & Jøsang, Audun. 2021, NIKT: Norsk IKT-konferanse for forskning og utdanning. (Article in business/trade/industry journal)

A new decision making model based on Rank Centrality for GDM with fuzzy preference relations. Yazidi, Anis; Ivanovska, Magdalena; Zennaro, Fabio Massimo; Lind, Pedro & Viedma, Enrique Herrera. 2021, European Journal of Operational Research. https://doi.org/10.1016/j.ejor.2021.05.030 (Academic article)

Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method. Musa, Arbena; Vishi, Kamer & Rexha, Blerim. 2021, Applied Artificial Intelligence. https://doi.org/10.1080/08839514.2021.1978149 (Academic article)

Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach. Chetwyn, Robert Andrew & Erdodi, Laszlo. 2021, CEUR Workshop Proceedings. (Academic article)

Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks. Bisztray, Tamas; Gruschka, Nils; Bourlai, Thirimachos & Fritsch, Lothar. 2021, Gesellschaft für Informatik. (Academic chapter/article/Conference paper)

Enhancing FIDO Transaction Confirmation with Structured Data Formats. Büttner, Andre & Gruschka, Nils. 2021, NIKT: Norsk IKT-konferanse for forskning og utdanning. (Academic article)

Extraction and Accumulation of Identity Attributes from the Internet of Things. Fritsch, Lothar & Gruschka, Nils. 2021, Gesellschaft für Informatik. (Academic chapter/article/Conference paper)

Informasjonssikkerhet: Teori og praksis . Jøsang, Audun. 2021, Universitetsforlaget. (Textbook)

Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems. Büttner, Andre; Nguyen, Hoai Viet; Gruschka, Nils & Lo Iacono, Luigi. 2021, Springer Nature. https://doi.org/10.1007/978-3-030-78120-0_22 (Academic chapter/article/Conference paper)

Preface. Gruschka, Nils; Antunes, Luís Filipe Coelho; Rannenberg, Kai & Drogkaris, Prokopios. 2021, Lecture Notes in Computer Science (LNCS). (Editoral)

Preface. Jøsang, Audun; Futcher, Lynn & Hagen, Janne Merete. 2021, IFIP Advances in Information and Communication Technology. (Editoral)

Representing Data Protection Aspects in Process Models by Coloring. Windrich, Melanie; Speck, Andreas & Gruschka, Nils. 2021, Springer Nature. https://doi.org/10.1007/978-3-030-76663-4_8 (Academic chapter/article/Conference paper)

Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. Erdodi, Laszlo; Sommervoll, Åvald Åslaugson & Zennaro, Fabio Massimo. 2021, Journal of Information Security and Applications. https://doi.org/10.1016/j.jisa.2021.102903 (Academic article)

The Agent Web Model - Modelling web hacking for reinforcement learning. Erdodi, Laszlo & Zennaro, Fabio Massimo. 2021, International Journal of Information Security. https://doi.org/10.1007/s10207-021-00554-7 (Academic article)

Threat Actor Type Inference and Characterization within Cyber Threat Intelligence . Mavroeidis, Vasileios; Hohimer, Ryan; Casey, Tim & Jøsang, Audun. 2021, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.23919/CyCon51939.2021.9468305 (Academic chapter/article/Conference paper)

2020

A nonproprietary language for the command and control of cyber defenses – OpenC2. Mavroeidis, Vasileios & Brule, Joe. 2020, Computers & Security. https://doi.org/10.1016/j.cose.2020.101999 (Academic article)

A Nonproprietary Language for the Command and Control of CyberDefenses - OpenC2. Mavroeidis, Vasileios & Brule, Joe. 2020, Computers & Security. https://doi.org/10.1016/j.cose.2020.101999 (Article in business/trade/industry journal)

Analyzing and Storing Network Intrusion Detection Data Using Bayesian Coresets: A Preliminary Study in Offline and Streaming Settings. Zennaro, Fabio Massimo. 2020, Springer. https://doi.org/10.1007/978-3-030-43887-6_16 (Academic chapter/article/Conference paper)

Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. Bisztray, Tamas; Gruschka, Nils; Mavroeidis, Vasileios & Fritsch, Lothar. 2020, Gesellschaft für Informatik. https://doi.org/10.18420/ois2020_17 (Academic chapter/article/Conference paper)

Examining the "Known Truths" in Cyber Threat Intelligence – The Case of STIX. Bromander, Siri; Muller, Lilly Pijnenburg; Eian, Martin & Jøsang, Audun. 2020, None. https://doi.org/10.34190/ICCWS.20.055 (Academic chapter/article/Conference paper)

Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Erdodi, Laszlo & Jøsang, Audun. 2020, Acta Polytechnica Hungarica. https://doi.org/10.12700/APH.17.7.2020.7.11 (Academic article)

Threat Poker: Gamification of Secure Agile. Jøsang, Audun; Stray, Viktoria & Rygge, Hanne. 2020, Springer. https://doi.org/10.1007/978-3-030-59291-2_10 (Academic chapter/article/Conference paper)

Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems. Zennaro, Fabio Massimo & Jøsang, Audun. 2020, Springer. (Academic chapter/article/Conference paper)

2019

An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations. Zennaro, Fabio Massimo; Ivanovska, Magdalena & Jøsang, Audun. 2019, International Journal of Approximate Reasoning. https://doi.org/10.1016/j.ijar.2019.05.005 (Academic article)

Belief Mosaics of Subjective Opinions. Jøsang, Audun. 2019, IEEE conference proceedings. (Academic chapter/article/Conference paper)

Counterfactually Fair Prediction Using Multiple Causal Models. Zennaro, Fabio Massimo & Ivanovska, Magdalena. 2019, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-030-14174-5_17 (Academic article)

Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Service. Wiefling, Stephan; Gruschka, Nils & Lo Iacono, Luigi. 2019, Springer Nature. https://doi.org/10.1007/978-3-030-35055-0_12 (Academic chapter/article/Conference paper)

Informasjonssikkerhet i høyere utdanning. Andersen, Anders; Berre, Tor; Ellingsen, Pål; Habib, Laurence Marie Anna; Haddara, Moutaz; Hjelmås, Erik; Jakobsen, Mette Mo; Jøsang, Audun; Nätt, Tom Heine; Li, Jingyue et al.. 2019, Nordic Journal of STEM Education. (Article in business/trade/industry journal)

Learning from man or machine: Spatial fixed effects in urban econometrics. Sommervoll, Åvald Åslaugson & Sommervoll, Dag Einar. 2019, Regional Science and Urban Economics. https://doi.org/10.1016/j.regsciurbeco.2019.04.005 (Academic article)

Privacy impact assessment: Comparing methodologies with a focus on practicality. Bisztray, Tamas & Gruschka, Nils. 2019, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-030-35055-0_1 (Academic article)

Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality. Gruschka, Nils & Bisztray, Tamas. 2019, Springer Nature. https://doi.org/10.1007/978-3-030-35055-0_1 (Academic chapter/article/Conference paper)

2018

A framework for data-driven physical security and insider threat detection. Mavroeidis, Vasileios; Vishi, Kamer & Jøsang, Audun. 2018, IEEE conference proceedings. https://doi.org/10.1109/ASONAM.2018.8508599 (Academic chapter/article/Conference paper)

Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. Santini, Francesco; Jøsang, Audun & Pini, Maria Silvia. 2018, IEEE conference proceedings. https://doi.org/10.23919/icif.2018.8455455 (Academic chapter/article/Conference paper)

Behavioural Computer Science: an agenda for combining modelling of human and system behaviours. Pedersen, Tore; Johansen, Christian & Jøsang, Audun. 2018, Human-centric Computing and Information Sciences. https://doi.org/10.1186/s13673-018-0130-0 (Academic article)

Classification of android app permissions: Tell me what app you are and i tell you what you are allowed to do. Gruschka, Nils; Iacono, Luigi Lo & Tolsdorf, Jan. 2018, Proceedings of the ... European conference on information warfare and security. (Academic article)

Data-Driven Threat Hunting Using Sysmon. Mavroeidis, Vasileios & Jøsang, Audun. 2018, Association for Computing Machinery (ACM). https://doi.org/10.1145/3199478.3199490 (Academic chapter/article/Conference paper)

Global Perspectives on Cybersecurity Education for 2030: A Case for a Meta-discipline. Parrish, Allen; Impagliazzo, John; Raj, Rajendra K.; Santos, Henrique; Asghar, Muhammad Rizwan; Jøsang, Audun; Pereira, Teresa & Stavrou, Eliana. 2018, Association for Computing Machinery (ACM). https://doi.org/10.1145/3293881.3295778 (Academic chapter/article/Conference paper)

Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. Gruschka, Nils; Mavroeidis, Vasileios; Vishi, Kamer & Jensen, Meiko. 2018, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData.2018.8622621 (Academic chapter/article/Conference paper)

Solving Security and Privacy Threats in Agile Software Development. Rygge, Hanne & Jøsang, Audun. 2018, Springer Nature. https://doi.org/10.1007/978-3-030-03638-6_29 (Academic chapter/article/Conference paper)

The impact of quantum computing on present cryptography. Mavroeidis, Vasileios; Vishi, Kamer; Zych, Mateusz & Jøsang, Audun. 2018, International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2018.090354 (Academic article)

Towards understanding sparse filtering: A theoretical perspective. Zennaro, Fabio Massimo & Chen, Ke. 2018, Neural Networks. https://doi.org/10.1016/j.neunet.2017.11.010 (Academic article)

Uncertainty Characteristics of Subjective Opinions. Jøsang, Audun; Cho, Jin-Hee & Chen, Feng. 2018, IEEE conference proceedings. https://doi.org/10.23919/ICIF.2018.8455454 (Academic chapter/article/Conference paper)

2017

A consistent definition of authorization. Jøsang, Audun. 2017, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-68063-7_9 (Academic article)

An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics. Vishi, Kamer & Mavroeidis, Vasileios. 2017, Norsk Informasjonssikkerhetskonferanse (NISK). (Academic article)

Automatic Detection of Malware-Generated Domains with Recurrent Neural Models. Lison, Pierre & Mavroeidis, Vasileios. 2017, Norsk Informasjonssikkerhetskonferanse (NISK). (Academic article)

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence.. Mavroeidis, Vasileios & Bromander, Siri. 2017, IEEE conference proceedings. https://doi.org/10.1109/EISIC.2017.20 (Academic chapter/article/Conference paper)

Exploit prevention, quo vadis?. Erdodi, Laszlo & Jøsang, Audun. 2017, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-68063-7_12 (Academic article)

Joint subjective opinions. Ivanovska, Magdalena; Jøsang, Audun; Zhang, Jie & Chen, Shuo. 2017, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-67422-3_19 (Academic article)

Neural Reputation Models learned from Passive DNS data. Lison, Pierre & Mavroeidis, Vasileios. 2017, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData.2017.8258361 (Academic chapter/article/Conference paper)

Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. Mavroeidis, Vasileios & Mathew, Nicho. 2017, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-65127-9_25 (Academic article)

X86 root of trust: Technical vs. political considerations. Loutfi, Ijlal & Jøsang, Audun. 2017, Proceedings of the ... European conference on information warfare and security. (Academic article)

2016

Bayesian Deduction with Subjective Opinions. Ivanovska, Magdalena; Jøsang, Audun & Sambo, Francesco. 2016, AAAI Press. (Academic chapter/article/Conference paper)

Decision Making Under Vagueness and Uncertainty. Jøsang, Audun. 2016, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1007/978-3-319-42337-1_4 (Academic chapter/article/Conference paper)

DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking. Migdal, Denis; Johansen, Christian & Jøsang, Audun. 2016, Association for Computing Machinery (ACM). https://doi.org/10.1145/2976749.2989033 (Chapter)

Generalising Bayes’ Theorem in Subjective Logic. Jøsang, Audun. 2016, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/MFI.2016.7849531 (Academic chapter/article/Conference paper)

Hey TPM, Sign My Transaction. Loutfi, Ijlal & Jøsang, Audun. 2016, Norsk Informasjonssikkerhetskonferanse (NISK). (Academic article)

Mitigating Local Attacks Against a City Traffic Controller. Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo & Nebot, Héctor. 2016, SciTePress. https://doi.org/10.5220/0005649802090218 (Academic chapter/article/Conference paper)

Predictive Reasoning in Subjective Bayesian Networks. Ivanovska, Magdalena & Jøsang, Audun. 2016, NIKT: Norsk IKT-konferanse for forskning og utdanning. (Academic article)

Principles of Subjective Networks. Jøsang, Audun & Kaplan, Lance. 2016, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1007/978-3-319-42337-1_5 (Academic chapter/article/Conference paper)

Privacy concerns of TPM 2.0. Loutfi, Ijlal & Jøsang, Audun. 2016, Proceedings of the ... European conference on information warfare and security. (Academic article)

Semantic cyberthreat modelling. Bromander, Siri; Jøsang, Audun & Eian, Martin. 2016, CEUR Workshop Proceedings. (Academic article)

Towards Behavioural Computer Science. Johansen, Christian; Pedersen, Tore & Jøsang, Audun. 2016, IFIP Advances in Information and Communication Technology. https://doi.org/10.1007/978-3-319-41354-9_12 (Academic article)

2015

Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Erdodi, Laszlo. 2015, Acta Polytechnica Hungarica. (Academic article)

1,2, Pause: Lets start by meaningfully navigating the current online authentication solutions space. Loutfi, Ijlal & Jøsang, Audun. 2015, IFIP Advances in Information and Communication Technology. https://doi.org/10.1007/978-3-319-18491-3_12 (Academic article)

An Accurate Rating Aggregation Method for Generating Item Reputation. Abdel-Hafez, Ahmad; Xu, Yue & Jøsang, Audun. 2015, IEEE conference proceedings. https://doi.org/10.1109/DSAA.2015.7344804 (Academic chapter/article/Conference paper)

Assurance Requirements for Mutual User and Service Provider Authentication. Jøsang, Audun. 2015, Springer Publishing Company. https://doi.org/10.1007/978-3-319-17016-9_3 (Academic chapter/article/Conference paper)

Assurance requirements for mutual user and service provider authentication. Jøsang, Audun. 2015, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-17016-9_3 (Academic article)

Cybersecurity through secure software development. Jøsang, Audun; Ødegaard, Marte & Oftedal, Erlend. 2015, IFIP Advances in Information and Communication Technology. https://doi.org/10.1007/978-3-319-18500-2_5 (Academic article)

FIDO Trust Requirements. Loutfi, Ijlal & Jøsang, Audun. 2015, Springer Publishing Company. https://doi.org/10.1007/978-3-319-26502-5_10 (Academic chapter/article/Conference paper)

Generating product feature hierarchy from product reviews. Tian, Nan; Xu, Yue; Li, Yuefeng; Abdel-Hafez, Ahmad & Jøsang, Audun. 2015, Lecture Notes in Business Information Processing. https://doi.org/10.1007/978-3-319-27030-2_17 (Academic article)

Information theory for subjective logic. Muller, Tim; Wang, Dongxia & Jøsang, Audun. 2015, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-23240-9_19 (Academic article)

Information Theory for Subjective Logic. Muller, Tim; Wang, Dongxia & Jøsang, Audun. 2015, Springer. https://doi.org/10.1007/978-3-319-23240-9_19 (Academic chapter/article/Conference paper)

It's not a bug, it's a feature: 25 years of mobile network insecurity. Jøsang, Audun; Miralabé, Laurent & Dallot, Leonard. 2015, Proceedings of the ... European conference on information warfare and security. (Academic article)

Mathematical Modelling of Trust Issues in Federated Identity Management. Ferdous, Md. Sadek; Norman, Gethin; Jøsang, Audun & Poet, Ron. 2015, IFIP Advances in Information and Communication Technology. https://doi.org/10.1007/978-3-319-18491-3_2 (Academic article)

Probabilistic Modeling of Humans in Security Ceremonies. Johansen, Christian & Jøsang, Audun. 2015, Springer Publishing Company. https://doi.org/10.1007/978-3-319-17016-9_18 (Academic chapter/article/Conference paper)

Probabilistic modelling of humans in security ceremonies. Johansen, Christian & Jøsang, Audun. 2015, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-17016-9_18 (Academic article)

Subjective Networks: Perspectives and Challenges. Ivanovska, Magdalena; Jøsang, Audun; Kaplan, Lance & Sambo, Francesco. 2015, Springer. https://doi.org/10.1007/978-3-319-28702-7_7 (Academic chapter/article/Conference paper)

Towards Subjective Networks: Extending Conditional Reasoning in Subjective Logic. Kaplan, Lance; Jøsang, Audun & Ivanovska, Magdalena. 2015, IEEE conference proceedings. (Academic chapter/article/Conference paper)

Trust Revision for Conflicting Sources. Jøsang, Audun; Ivanovska, Magdalena & Muller, Tim. 2015, IEEE conference proceedings. (Academic chapter/article/Conference paper)

When Every Byte Counts – Writing Minimal Length Shellcodes. Erdodi, Laszlo & Nemeth, Zoltan. 2015, IEEE Press. https://doi.org/10.1109/sisy.2015.7325392 (Academic chapter/article/Conference paper)

2014

A Combined Method for Mitigating Sparsity Problem in Tag Recommendation. Djuana, Endang; Xu, Yue; Li, Yuefeng & Jøsang, Audun. 2014, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/HICSS.2014.120 (Academic chapter/article/Conference paper)

A Normal-Distribution Based Reputation Model. Abdel-Hafez, Ahmad; Xu, Yue & Jøsang, Audun. 2014, Springer. https://doi.org/10.1007/978-3-319-09770-1_13 (Academic chapter/article/Conference paper)

Biometric Data Fusion Based on Subjective Logic. Jøsang, Audun & Munch-Møller, Thorvald H G. 2014, IEEE (Institute of Electrical and Electronics Engineers). (Academic chapter/article/Conference paper)

Identity Management and Trusted Interaction in Internet and Mobile Computing. Jøsang, Audun. 2014, IET Information Security. https://doi.org/10.1049/iet-ifs.2012.0133 (Academic article)

Inverting Conditional Opinions in Subjective Logic. Jøsang, Audun & Sambo, Francesco. 2014, None. (Academic chapter/article/Conference paper)

One-time biometrics for online banking and electronic payment authentication. Plateaux, Aude; Lacharme, Patrick; Jøsang, Audun & Rosenberger, Christophe. 2014, Lecture Notes in Computer Science (LNCS). https://doi.org/10.1007/978-3-319-10975-6_14 (Academic article)

One-time biometrics for Online Banking and Electronic Payment Authentication. Plateaux, Aude; Lacharme, Patrick; Jøsang, Audun & Rosenberger, Christophe. 2014, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1007/978-3-319-10975-6_14 (Academic chapter/article/Conference paper)

Potential Cyber Warfare Capabilities of Major Technology Vendors. Jøsang, Audun. 2014, Academic Conferences International (ACI). (Academic chapter/article/Conference paper)

URREF Self-Confidence in Information Fusion Trust. Blasch, Erik; Jøsang, Audun; Dezert, Jean; Costa, Paulo C.G. & Jousselme, Anne-Laure. 2014, IEEE (Institute of Electrical and Electronics Engineers). (Academic chapter/article/Conference paper)

2013

An Experiment Investigating the Usability of Personal Firewalls. Alfayyadh, Bander; Alzomai, Mohammed & Jøsang, Audun. 2013, International Academy, Research and Industry Association (IARIA). (Academic chapter/article/Conference paper)

An Ontology-based Method for Sparsity Problem in Tag Recommendation. Djuana, Endang; Xu, Yue; Li, Yuefeng; Jøsang, Audun & Cox, Clive. 2013, SciTePress. https://doi.org/10.5220/0004439904670474 (Academic chapter/article/Conference paper)

Combining Recommender and Reputation Systems to Produce Better Online Advice. Jøsang, Audun; Guo, Guibing; Pini, Maria Silvia; Santini, Francesco & Xu, Yue. 2013, Springer. https://doi.org/10.1007/978-3-642-41550-0_12 (Academic chapter/article/Conference paper)

Determining Model Correctness for Situations of Belief Fusion. Jøsang, Audun; Costa, Paulo C.G. & Blasch, Erik. 2013, IEEE conference proceedings. (Academic chapter/article/Conference paper)

Entity Authentication & Trust Validation in PKI using Petname Systems. Ferdous, Md. Sadek & Jøsang, Audun. 2013, IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch013 (Academic chapter/article/Conference paper)

Extended HTTP Digest Access Authentication. Jøsang, Audun; Varmedal, Kent Are & Klevjer, Henning. 2013, Springer. https://doi.org/10.1007/978-3-642-37282-7_7 (Academic chapter/article/Conference paper)

Multimodal Biometric Authentication using Fingerprint and Iris Recognition in Identity Management. Vishi, Kamer & Yayilgan, Sule Yildirim. 2013, IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/iih-msp.2013.91 (Academic chapter/article/Conference paper)

PKI Trust Models. Jøsang, Audun. 2013, IGI Global. (Academic chapter/article/Conference paper)

Reputation-based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. Alzaid, Hani; Alfaraj, Manal; Ries, Sebastian; Jøsang, Audun; Albabtain, Muneera & Abuhaimed, Alhanof. 2013, Springer. https://doi.org/10.1007/978-3-642-38323-6_5 (Academic chapter/article/Conference paper)

Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications. Yan, Zheng; Wang, Guojun; Deng, Robert H. & Jøsang, Audun. 2013, IET Information Security. https://doi.org/10.1049/iet-ifs.2013.0043 (Editoral)

The OffPAD: Requirements and Usage. Varmedal, Kent Are; Hovlandsvåg, Joakim; Jøsang, Audun; Vincent, Johann; Miralabé, Laurent & Klevjer, Henning. 2013, Springer. https://doi.org/10.1007/978-3-642-38631-2_7 (Academic chapter/article/Conference paper)

2012

Dempster's rule as seen by little colored balls. Jøsang, Audun & Pope, Simon. 2012, Computational Intelligence. https://doi.org/10.1111/j.1467-8640.2012.00421.x (Academic article)

Interpretation and Fusion of Hyper Opinions in Subjective Logic. Jøsang, Audun & Hankin, Robin. 2012, IEEE Press. (Academic chapter/article/Conference paper)

Robustness of Trust and Reputation Systems: Does it Matter?. Jøsang, Audun. 2012, Springer Publishing Company. https://doi.org/10.1007/978-3-642-29852-3_21 (Academic chapter/article/Conference paper)

Service Provider Authentication Assurance. Jøsang, Audun; Varmedal, Kent Are; Rosenberger, Christophe & Kumar, Rajendra. 2012, IEEE Press. https://doi.org/10.1109/pst.2012.6297941 (Academic chapter/article/Conference paper)

The state-of-the-art in personalized recommender systems for social networking. Zhou, Xujan; Xu, Yue; Li, Yuefeng; Jøsang, Audun & Cox, Clive. 2012, Artificial Intelligence Review. https://doi.org/10.1007/s10462-011-9222-1 (Academic literature review)

Trust Extortion on the Internet. Jøsang, Audun. 2012, Springer Publishing Company. https://doi.org/10.1007/978-3-642-29963-6_2 (Academic chapter/article/Conference paper)

Trust Transitivity and Conditional Belief Reasoning. Jøsang, Audun; Azderska, Tanja & Marsh, Stephen. 2012, Springer Publishing Company. https://doi.org/10.1007/978-3-642-29852-3_5 (Academic chapter/article/Conference paper)