• Investigation into Phishing Risk Behaviour among Healthcare Staff 

      Yeng, Prosper; Fauzi, Muhammad Ali; Yang, Bian; Nimbe, Peter (Peer reviewed; Journal article, 2022)
      A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social ...
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Legal requirements toward enhancing the security of medical devices 

      Yeng, Prosper; Yang, Bian; Wolthusen, Stephen D. (Peer reviewed; Journal article, 2020)
      Over 25 million Americans are dependent on medical devices. However, the patients who need these devices only have two choices, thus the choice between using an insecure critical-life-functioning devices or the choice to ...
    • Managing private credentials by privacy-preserving biometrics 

      Yang, Bian; Li, Guoqiang (Journal article; Peer reviewed, 2018)
      We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ...
    • Mapping the Psychosocialcultural Aspects of Healthcare Professionals’ Information Security Practices: Systematic Mapping Study 

      Yeng, Prosper; Szekeres, Adam; Yang, Bian; Snekkenes, Einar Arthur (Peer reviewed; Journal article, 2021)
      Background: Data breaches in health care are on the rise, emphasizing the need for a holistic approach to mitigation efforts. Objective: The purpose of this study was to develop a comprehensive framework for modeling ...
    • Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research 

      Vestad, Arnstein; Yang, Bian (Chapter; Conference object, 2023)
      Municipalities are tasked with ensuring the cybersecurity of critical public services and functions in diverse areas such as safe water supply, healthcare, child protective services, and education with vastly different ...
    • Novel and Efficient Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz; Eskeland, Sigurd; Yang, Bian (Peer reviewed; Journal article, 2024)
      Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such ...
    • PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies 

      Fauzi, Muhammad Ali; Yang, Bian; Martiri, Edlira (Chapter, 2020)
      The main challenge in a honeywords system is how to generate artificial passwords (honeywords) that are indistinguishable from the genuine password (sugarword). It is straightforward to consider the PassGAN for generating ...
    • Password Guessing-Based Legacy-UI Honeywords Generation Strategies for Achieving Flatness 

      Fauzi, Muhammad Ali; Yang, Bian; Martiri, Edlira (Chapter, 2020)
      The legacy-UI honeywords generation approach is more favored due to its high usability compared to the modified-UI approach that sometimes becomes unusable in practice. However, several prior arts on legacy-UI based ...
    • Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level 

      Yang, Bian; Busch, Christoph; Groot, Koen de; Xu, Haiyun; Veldhuis, Raymond N.J. (Journal article; Peer reviewed, 2012)
      In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a ...
    • Privacy preserving data sharing with partially-trusted cloud services 

      Afiouni, Ahmad (Master thesis, 2023)
      I dag har personlig informasjon blitt en ressurs som det kan tjenes penger på, og datadeling har nesten blitt en nødvendighet innen felt som vitenskapelig forskning, e-helse, e-handel og digital virksomhet. Selv om det er ...
    • Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz (Doctoral theses at NTNU;2024:83, Doctoral thesis, 2024)
      Digital security uses traditional authentication mechanisms to verify the identity of an entity or a user who seeks access to a system, service, or application. Such authentication mechanisms verify user identity only at ...
    • Privacy-preserving continuous authentication using behavioral biometrics 

      Baig, Ahmed Fraz; Eskeland, Sigurd; Yang, Bian (Peer reviewed; Journal article, 2023)
      Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about user activities, behaviors, and other demographic information, which ...
    • Reinforcing Health Data Sharing through Data Democratization 

      Wang, Yuhang; Blobel, Bernd; Yang, Bian (Journal article; Peer reviewed, 2022)
    • Response Center Services: An Exploratory Study 

      Sun, Luyi; Yang, Bian (Peer reviewed; Journal article, 2022)
    • Trust Management for a Smart Card Based Private eID Manager 

      Chen, Shi (Master thesis, 2016)
      Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ...
    • Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices 

      Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian (Journal article; Peer reviewed, 2020)
      Abstract: In recent years, there has been an increase in the application of attribute-based access control (ABAC) in electronic health (e-health) systems. E-health systems are used to store a patient’s electronic version ...
    • Web Vulnerability Measures for SMEs 

      Yeng, Prosper; Yang, Bian; Solvoll, Terje; Nimbe, Peter; Weyori, Benjamin Asubam (Journal article; Peer reviewed, 2019)
      An investigation was conducted into web vulnerabilities in commonly used web application templates and frameworks (WAFs) systems such as Joomla, WordPress, Moodle and C #.Net framework. A web vulnerability scoring scheme ...