• A Framework for the Validation of Network Artifacts 

      Nweke, Livinus Obiora (Journal article; Peer reviewed, 2019)
    • An Initial Insight Into InfoSec Risk Management Practices 

      Wangen, Gaute (Journal article; Peer reviewed, 2015)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
    • Comparing Open Source Search Engine Functionality, Efficiency and Effectiveness with Respect to Digital Forensic Search 

      Hansen, Joachim; Porter, Kyle; Shalaginov, Andrii; Franke, Katrin (Journal article; Peer reviewed, 2018)
      Keyword search is one of the key components of the Cyber Crime Investigations. It has a direct influence on the precision and relevance of the data found on seized data carriers. However, many of the digital forensics tools ...
    • Difficult SQLi Code Patterns for Static Code Analysis Tools 

      Schuckert, Felix; Katt, Basel; Langweg, Hanno (Peer reviewed; Journal article, 2020)
      We compared vulnerable and xed versions of the source code of 50 dierent PHP open source projects based on CVE reports for SQL injection vulnerabilities. We scanned the source code with commercial and open source tools for ...
    • Distributed Personal Password Repository using Secret Sharing 

      Løland Elle, Merete; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2018)
      Secret sharing based systems can provide both data secrecy and recoverability simultaneously. This is achieved by a special cryptographical splitting of the data, where the parts, called shares, are distributed among a ...
    • Distributed Trust Empowerment for Secure Offline Communications 

      Mæland, Endre; Berbom, Sigmund Bernhard; Tola, Besmir; Jiang, Yuming (Peer reviewed; Journal article, 2022)
    • Explainable Visualization for Morphing Attack Detection 

      Myhrvold, Henning; Zhang, Haoyu; Tapia, Juan; Ramachandra, Raghavendra; Busch, Christoph Günther (Peer reviewed; Journal article, 2022)
      Detecting morphed face images has become critical for maintaining trust in automated facial biometric verification systems. It is well demonstrated that better biometric performance of the Face Recognition System (FRS) ...
    • Knowledge and Skills Needed to Craft Successful Cybersecurity Strategies 

      Kianpour, Mazaher (Peer reviewed; Journal article, 2020)
      Daily advancing technologies and next-generation networks are creating entirely different digital environments for people, organizations, and governments within the next several years. Because cybersecurity provision in ...
    • Memory access patterns for malware detection 

      Banin, Sergii; Shalaginov, Andrii; Franke, Katrin (Journal article; Peer reviewed, 2016)
      Malware brings significant threats to modern digitized society. Malware developers put in significant efforts to evade detection and remain unnoticed on victims' computers despite a number of malware detection techniques. ...
    • Source Code Patterns of Cross Site Scripting in PHP Open Source Projects 

      Schuckert, Felix; Hildner, Max; Katt, Basel; Langweg, Hanno (Journal article; Peer reviewed, 2018)
      To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed ...
    • Study of Blacklisted Malicious Domains from a Microsoft Windows End-user Perspective: Is It Safe Behind the Wall? 

      Jensen, Øyvind; Shalaginov, Andrii; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2020)
      The Internet is a dangerous place, _lled with di_erent cyber threats, including malware. To withstand this, blacklists have been utilized for a long time to block known infection and delivery sources. However, through ...
    • The NISK 2018 Proceedings: Message from the Programme Chairs 

      Mjølsnes, Stig Frode; Soleng, Ragnar (Journal article; Peer reviewed, 2018)
      This NISK Journal volume 11 is the published proceedings of the papers presented at NISK 2018: the 11th Norwegian Information Security Conference 2018 held on September 18-20, 2018 in Longyearbyen, Svalbard. The aim of the ...
    • The Tension between Anonymity and Privacy 

      Vinterbo, Staal (Journal article; Peer reviewed, 2018)
      Privacy in the context of information and data is often defined in terms of anonymity, particularly in regulations such as the GDPR. Operationally, it is appealing to define privacy in terms of computable data properties ...
    • Us against the World: Detection of Radical Language in Online Platforms 

      Theisen, Esther; Bours, Patrick; Agarwal, Nancy (Journal article; Peer reviewed, 2021)
    • User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps 

      Rikardsen, Charlotte S.; Hale, Britta; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2018)
      Instant messaging applications are increasingly claiming to offer end-to-end encryption. Yet actual, user perspectives on the necessity, appropriateness, and desirability of such “secure apps” are poorly understood. This ...
    • Web Vulnerability Measures for SMEs 

      Yeng, Prosper; Yang, Bian; Solvoll, Terje; Nimbe, Peter; Weyori, Benjamin Asubam (Journal article; Peer reviewed, 2019)
      An investigation was conducted into web vulnerabilities in commonly used web application templates and frameworks (WAFs) systems such as Joomla, WordPress, Moodle and C #.Net framework. A web vulnerability scoring scheme ...