• A Comparison of Two Historical Trader Societies – An Agent-Based Simulation Study of English East India Company and New-Julfa 

      Sedigh, Amir Hosein Afshar; Frantz, Christopher; Savarimuthu, Bastin Tony Roy; Purvis, Martin K; Purvis, Maryam A (Journal article; Peer reviewed, 2019)
      In this paper, we study the English East India Company (EIC) and Armenian traders of New-Julfa (Julfa) that were active during 17th and 18th centuries. Both were successful trading cooperatives that relied on different ...
    • A multi-objective evolutionary algorithm for color image segmentation 

      Ripon, Kazi Shah Nawaz; Ali, Lasker Ershad; Newaz, Sarfaraz; Ma, Jinwen (Journal article; Peer reviewed, 2017)
      In this paper, we present a multi-objective segmentation approach for color images. Three objectives, overall deviation, edge value, and connectivity measure, are optimized simultaneously using a multi-objective evolutionary ...
    • A Simple Algorithm for Estimating Distribution Parameters from n -Dimensional Randomized Binary Responses 

      Vinterbo, Staal (Journal article; Peer reviewed, 2018)
      Randomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple ...
    • A verifiable shuffle for the GSW cryptosystem 

      Strand, Martin (Journal article; Peer reviewed, 2019)
      This paper provides the first verifiable shuffle specifically for fully homomorphic schemes. A verifiable shuffle is a way to ensure that if a node receives and sends encrypted lists, the content will be the same, even ...
    • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols 

      Tsay, Joe-Kai; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2012)
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • Anchored kernel hashing for cancelable template protection for cross-spectral periocular data 

      Bylappa Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph (Journal article; Peer reviewed, 2019)
      Periocular characteristics is gaining prominence in biometric systems and surveillance systems that operate either in NIR spectrum or visible spectrum. While the ocular information can be well utilized, there exists a ...
    • Artificial Intelligence in the Public Sector: A Study of Challenges and Opportunities for Norwegian Municipalities 

      Mikalef, Patrick; Fjørtoft, Siw Olsen; Torvatn, Hans Yngvar (Journal article; Peer reviewed, 2019)
      The value of Artificial Intelligence (AI) in augmenting or even replacing human decision-making in the organizational context is gaining momentum in the last few years. A growing number of organizations are now experimenting ...
    • Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 

      Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ...
    • Bayesian-Supported Retrieval in BNCreek: A Knowledge-Intensive Case-Based Reasoning System 

      Nikpour, Hoda; Aamodt, Agnar; Bach, Kerstin (LNCS;volume 11156, Journal article; Peer reviewed, 2018)
      This study presents a case-based reasoning (CBR) system that makes use of general domain knowledge - referred to as a knowledge-intensive CBR system. The system applies a Bayesian analysis aimed at increasing the accuracy ...
    • Big Data Analytics as an Enabler of Process Innovation Capabilities: A Configurational Approach 

      Mikalef, Patrick; Krogstie, John (Journal article; Peer reviewed, 2018)
      A central question for information systems (IS) researchers and practitioners is if, and how, big data can help attain a competitive advantage. Anecdotal claims suggest that big data can enhance a firm’s incremental and ...
    • Case based reasoning as a model for cognitive artificial intelligence 

      Craw, Susan; Aamodt, Agnar (Journal article; Peer reviewed, 2018)
      Cognitive Systems understand the world through learning and experience. Case Based Reasoning (CBR) systems naturally capture knowledge as experiences in memory and they are able to learn new experiences to retain in their ...
    • Chromatic adaptation in colour management 

      Green, Philip John; Habib, Tanzima (Journal article; Peer reviewed, 2019)
      Chromatic adaptation transforms are used to predict corresponding colours viewed under a different adapting illuminant. In colour management it is often necessary to apply such a transform in order to achieve a ...
    • Cognitive Profiles and Education of Female Cyber Defence Operators 

      Lugo, Ricardo Gregorio; Firth-Clark, Andrea; Knox, Benjamin James; Jøsok, Øyvind; Helkala, Kirsi Marjaana; Sütterlin, Stefan (Peer reviewed; Journal article, 2019)
      Rapid technological developments and definition of the cyber domain as a battlefield has challenged the cognitive attributes of its operators. In order to meet these demands, higher education programs in STEM (science, ...
    • Correlating High- and Low-Level Features: Increased Understanding of Malware Classification 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Journal article; Peer reviewed, 2019)
      Malware brings constant threats to the services and facilities used by modern society. In order to perform and improve anti-malware defense, there is a need for methods that are capable of malware categorization. As malware ...
    • Could We Issue Driving Licenses to Autonomous Vehicles? 

      Li, Jingyue; Zhang, Jin; Kaloudi, Nektaria (Journal article; Peer reviewed, 2018)
      Many companies are studying autonomous vehicles. One trend in the development of control algorithms for autonomous vehicles is the use of deep-learning approaches. The general idea is to simulate a human driver’s decision-making ...
    • Cyber security risk assessment of a DDoS attack 

      Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V (Journal article; Peer reviewed, 2016)
      This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • D2C-SM: Designing a Distributed-to-Centralized Software Management Architecture for Smart Cities 

      Sinaeepourfard, Amir; Petersen, Sobah Abbas; Ahlers, Dirk (Peer reviewed; Journal article, 2019)
      Smart city innovations can enhance the quality of citizens’ life through different smart technology management solutions, including resource management, data management, and software management. Nowadays, there are two ...
    • Data-Driven Maritime Processes Management Using Executable Models 

      Richta, Tomáš; Wang, Hao; Osen, Ottar; Styve, Arne; Janoušek, Vladimír (Journal article, 2018)
      In this paper we describe a decision support system for maritime traffic and operations, based on formal models and driven by data from the environment. To handle the complexity of system description, we work with a ...