• A Survey of Automated Information Exchange Mechanisms Among CERTs 

      Yamin, Muhammad Mudassar; Katt, Basel (Journal article; Peer reviewed, 2019)
      Nowadays innovative computer related exploits are released every single day, which makes researching about those exploits a significant task. A CERT (Computer Emergency Response Team) is an expert group that is responsible ...
    • Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Peer reviewed; Journal article, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Ali, Subhan; Abomhara, Mohamed Ali Saleh (Journal article; Peer reviewed, 2024)
      The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ...
    • AI Legal Assistant: Enhancing GDPR Compliance with Large Language Models 

      Bjerknes, Emil Farstad; Bjørneng, Paul Røkke; Bliksvær, Torje Grimstad (Bachelor thesis, 2024)
      Futurize AS er et oppstartsselskap som spesialiserer seg i utviklingen av innovative løsninger for den juridiske bransjen gjennom integrasjon av KI i arbeidsflyten. De søker ny innsikt og perspektiv på utviklingen av AI ...
    • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

      Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
      Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
    • Automatic Verification and Execution of Cyber Attack on IoT Devices 

      Færøy, Fartein Lemjan; Yamin, Muhammad Mudassar; Shukla, Ankur; Katt, Basel (Journal article; Peer reviewed, 2023)
    • Benign Paroxysmal Positional Vertigo Disorders Classification Using Eye Tracking Data 

      Hashmi, Ehtesham; Yamin, Muhammad Mudassar; Beghdadi, Azeddine; Alaya Cheikh, Faouzi; Ullah, Mohib (IFIP Advances in Information and Communication Technology;, Chapter, 2024)
      Nystagmus is a neurological condition characterized by involuntary and rhythmic eye movements. These abnormal eye movements can be indicative of various underlying neurological and vestibular disorders, impacting visual ...
    • Cyber Crisis Chess Board for Strategic and Tactical Level of Organizations 

      Lundli, Sivert (Master thesis, 2023)
      En rekke alvorlige dataangrep i de senere år har gang på gang vist hvor avhengig vi som samfunn er av digitale løsninger, og hvor sårbare vi som samfunn er, skulle disse bli satt ut av spill. Ved bortfall av digitale ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Security Megagame Platform 

      Innvær, Brynjar; Haug, Kevin; Kjelaas, Marie (Bachelor thesis, 2024)
      Den økende kompleksiteten av cybertrusler krever innovative pedagogiske verktøy. Cyber Security Technopoly (C.S. Technopoly), et konsept fremmet av Interactive ICS AS og GSTSG AB , er en omfattende spillplattform designet ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Enhancing Misogyny Detection in Bilingual Texts Using FastText and Explainable AI 

      Hashmi, Ehtesham; Yamin, Muhammad Mudassar; Imran, Ali Shariq; Yildirim-Yayilgan, Sule; Ullah, Mohib (Chapter, 2024)
      Gendered disinformation not only harms women's rights and democratic norms, but it also threatens national security by worsening societal divisions through authoritarian regimes' intentional weaponization of social media. ...
    • Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain 

      Yamin, Muhammad Mudassar; Katt, Basel (Journal article; Peer reviewed, 2019)
      An autonomous adversaries in cyber domain are new type of adversaries present in a cyber security exercise. Traditionally, adversaries in cyber security exercises are human who perform the roles of attackers and defenders. ...
    • Framework for secure data collection and through integration with various APIs 

      Schonhowd, Sindre Davidsen; Voll, Magnus Lekanger; Wahlstrøm, Øivind (Bachelor thesis, 2023)
      Tussa er ett norskt selskap lokalisert på vestlandet som arbeider for å skape fremtidsrettet og miljøvennlige løsninger. Tussa ønsket en forbedret løsning på datainnsamlingen fra sine kunder gjennom Microsoft Intune, Cisco ...
    • Generating historical network logs for cyber range exercises 

      Isnes, Christian Simoes (Master thesis, 2023)
      Cyberangrep blir stadig mer vanlige, og studier viser at trusler fra Advanced Persistance Threats (APT'er), øker eksponentielt. Trening av cybersikkerhetsprofesjonelle i realistiske miljøer er avgjørende for å være forberedt ...
    • Hybrid IoT Cyber Range 

      Balto, Karl Edvard (Master thesis, 2022)
      Bruken av IoT enheter har økt kraftig de siste årene, utviklingen av nye enheter går fort, prisene presses og dermed må også kostnadene reduseres. IoT enheter får flere og flere oppgaver der det blir mer kritisk at enhetene ...
    • Hybrid IoT Cyber Range 

      Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)
      The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ...
    • Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics 

      Yamin, Muhammad Mudassar; Katt, Basel; Sattar, Kashif; Bin Ahmed, Maaz (Journal article; Peer reviewed, 2019)
      An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information ...
    • Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security 

      Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel; Hijji, Mohammad; Muhammad, Khan (Peer reviewed; Journal article, 2022)
      Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily ...