• A Survey of Automated Information Exchange Mechanisms Among CERTs 

      Yamin, Muhammad Mudassar; Katt, Basel (Journal article; Peer reviewed, 2019)
      Nowadays innovative computer related exploits are released every single day, which makes researching about those exploits a significant task. A CERT (Computer Emergency Response Team) is an expert group that is responsible ...
    • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

      Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
      Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain 

      Yamin, Muhammad Mudassar; Katt, Basel (Journal article; Peer reviewed, 2019)
      An autonomous adversaries in cyber domain are new type of adversaries present in a cyber security exercise. Traditionally, adversaries in cyber security exercises are human who perform the roles of attackers and defenders. ...
    • Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics 

      Yamin, Muhammad Mudassar; Katt, Basel; Sattar, Kashif; Bin Ahmed, Maaz (Journal article; Peer reviewed, 2019)
      An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information ...
    • Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges 

      Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2022)
      The skill shortage in global cybersecurity is a well-known problem; to overcome this issue, cyber ranges have been developed. These ranges provide a platform for conducting cybersecurity exercises; however, conducting such ...
    • Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges 

      Yamin, Muhammad Mudassar (Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)
      Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ...
    • Ontology-Based Scenario Modeling for Cyber Security Exercise 

      Wen, Shao-Fang; Yamin, Muhammad Mudassar; Katt, Basel (Chapter, 2021)
      The growing demand for cyber security professionals with practical knowledge is boosting the development and conduct of cyber security exercises around the world. Scenarios stand a central position of the exercise, which ...
    • Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study 

      Yamin, Muhammad Mudassar; Katt, Basel; Torseth, Espen (Peer reviewed; Journal article, 2021)
      With the increasing popularization of cybersecurity concepts due to ever increasing cybersecurity incidents, it is no secret that countries worldwide are investing heavily in cybersecurity education to build the necessary ...
    • Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises 

      Yamin, Muhammad Mudassar; Katt, Basel; Nowostawski, Mariusz (Peer reviewed; Journal article, 2021)
      Technology is evolving rapidly; this poses a problem for security specialists and average citizens as their technological skill sets are quickly made obsolete. This makes the knowledge and understanding of cyber-security ...
    • Smart Policing for a Smart World Opportunities, Challenges and Way Forward 

      Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2020)
      Our world is getting evolved to smart world day by day. This smart world is being developed to make people life easier through the data generated by the smart devices. Data is the fuel that powers the smart world evolution, ...
    • Toward AI-Based Scenario Management for Cyber Range Training 

      Hannay, Jo Erskine; Stolpe, Audun; Yamin, Muhammad Mudassar (Chapter, 2021)
      There is an immediate need for a greater number of highly skilled cybersecurity personnel to meet intensified cyber attacks. We propose a cyber range exercise management architecture that employs machine reasoning to ...
    • UI0T-FMT: Universal format for collection and aggregation of data from smart devices 

      Seljeseth, Mats Didriksen (Master thesis, 2020)
      Informasjons teknologi (IT) har blitt et særdeles omfattende del av menneskets hverdag. Hverdagslige apparater og dingser har blitt mer integrert med Smart Teknologi, som gjør det enklere for individet å bruke de. Med andre ...
    • UIOT-FMT: A Universal Format for Collection and Aggregation of Data from Smart Devices 

      Seljeseth, Mats; Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2020)
      Information Technology (IT) has become an essential part of our lives and due to the emergence of the Internet-of-Things (IoT), technology has encompassed a majority of things that humans rely on in their daily lives. ...