• Intelligent mobile malware detection using permission requests and API calls 

    Alazab, Moutaz; Alazab, Mamoun; Shalaginov, Andrii; Mesleh, Abdelwadood; Awajan, Albara (Peer reviewed; Journal article, 2020)
    Malware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against the ...
  • ACCURACY OF SIMPLIFIED METHODS FOR FATIGUE DAMAGE ESTIMATION OF EXPOSED FISH FARMS 

    Bore, Pål Takle; Amdahl, Jørgen (Peer reviewed; Journal article, 2020)
    Fish farms are being placed in more exposed locations than earlier, encouraged by the “development licenses” that the Norwegian Directorate of Fisheries have introduced. Traditional design methods for estimating fatigue ...
  • Automated Metal Cleanliness Analyzer (AMCA) – An Alternative Assessment of Metal Cleanliness in Aluminum Melts 

    Zedel, Hannes; Fritzsch, Robert; Akhtar, Shahid; Aune, Ragnhild Elizabeth (Peer reviewed; Journal article, 2021)
    The established industry standards for assessing the cleanliness of aluminum melts are PoDFA (Porous Disc Filtration Apparatus) and LiMCA (Liquid Metal Cleanliness Analyzer) analyses. PoDFA provides the necessary qualitative ...
  • A review of additive manufacturing of cermets 

    Aramian, Atefeh; Razavi, Seyed Mohammad Javad; Sadeghian, Zohreh; Berto, Filippo (Peer reviewed; Journal article, 2020)
    Cermets are a category of materials including ceramic and metallic phases, which possess the combined properties of both phases. Over the last few decades, numerous conventional processes such as powder metallurgy techinques ...
  • Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies 

    Khan, Muhammad Imran; Foley, Simon N.; O'Sullivan, Barry (Peer reviewed; Journal article, 2020)
    In this paper a notion of privacy-anomaly detection is presented where normative privacy is modelled using k-anonymity. Based on the model, normative privacy-profiles are constructed, and deviation from normative privacy-profile ...

Vis flere