Anomaly Detection using Advanced Data Analytics in 5G-IoT |
17. jan. 2024 |
|
Digital Twin-based Anomaly Detection for e-Health Infrastructures |
17. jan. 2024 |
|
A NIS2 pan-European registry for identifying and classifying essential and important entities |
18. okt. 2023 |
|
Mapping and analyzing the Norwegian cybersecurity incident reporting ecosystem |
18. okt. 2023 |
|
Beste praksis for sikkerhetsstyring av informasjonssikkerhet |
17. okt. 2023 |
|
A Survey of Windows' Data Protection API (DPAPI) |
9. okt. 2023 |
|
Investigating anti-forensic techniques and their detection |
9. okt. 2023 |
|
Forensic Analysis of Secure Messaging Applications on Android Devices |
9. okt. 2023 |
|
Automated Reverse Engineering of Malware Binaries |
9. okt. 2023 |
|
Automated malware classification systems using machine learning |
9. okt. 2023 |
|
Behavior analysis of emerging malware strains |
9. okt. 2023 |
|
Memory Forensics: Techniques and tools for analysing volatile memory |
9. okt. 2023 |
|
Identification and analysis of forensic artifacs in operating systems |
9. okt. 2023 |
|
LLM for loggdata |
8. okt. 2023 |
|
Cybersikkerhet for småkraft |
7. okt. 2023 |
|
Cybersikkerhet i fornybar energiproduksjon |
7. okt. 2023 |
|
Vurdering av sikkerhet for sikkerhetsprodukter |
7. okt. 2023 |
|
Cybersikkerhet i elbilladere |
7. okt. 2023 |
|
Security and Privacy of eIDAS 2.0 Compliant Apps |
28. sep. 2023 |
|
Sikkerhet i maskinlæringsmodeller |
28. sep. 2023 |
|
Threat Indication Using Web Search Engine Trends |
20. aug. 2023 |
|
An Application for Graphically Representing Cybersecurity Operations Playbooks: the CACAO use case |
29. okt. 2022 |
|
Integrated Defense with OASIS Open Command and Control (OpenC2) |
17. okt. 2022 |
|
Open-Source Vulnerabilities in Software Supply Chains |
30. sep. 2022 |
|
Kvalitetsvurdering av setninger som passord |
30. sep. 2022 |
|
Using cryptography insecurely: Don’t do this at home! – But why? |
21. sep. 2022 |
|
Smart contract for an investment and trading platform |
19. sep. 2022 |
|
Deteksjon av sjelden angrepstrafikk med Fourier-analyse |
8. sep. 2022 |
|
Deteksjon av gammel/utdatert programvare |
7. sep. 2022 |
|
Applied Cyber Security |
7. sep. 2022 |
|
Measurement of Censorship in Norway |
1. sep. 2022 |
|
Cybersikkerhet i infrastruktur for elbillading |
27. aug. 2022 |
|
Analysis of Multi-Party Relays |
17. juni 2022 |
|
Security of Digital Signatures for PDF |
29. mars 2022 |
|
Post-quantum kryptografi: Lattice med struktur |
22. okt. 2021 |
|
Post-quantum kryptografi: CSIDH |
22. okt. 2021 |
|
Security and Privacy of Media Capturing |
21. okt. 2021 |
|
From VLAN separation to microsegmentation and NSX in a large-scale environment |
21. okt. 2021 |
|
Utilizing Sentiment Analysis and Large Language Models for Identifying and Understanding Disinformation Campaigns |
20. okt. 2021 |
|
Server-side JavaScript vulnerabilities |
20. okt. 2021 |
|
Skystrategi i samsvar med GDPR |
12. sep. 2021 |
|
Visualization of Threat Intelligence |
31. aug. 2021 |
|
Developing a Tool for Annotating Threat Reports |
31. aug. 2021 |
|
Security Analysis Methods and Tools |
23. aug. 2021 |
|
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence |
14. nov. 2020 |
|
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer |
10. aug. 2020 |
|
Analyse av Secure Multi-party Computation (MPC) |
10. aug. 2020 |
|
Analyse av lettvektsalgoritmer for postkvantekrypto |
10. aug. 2020 |
|
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols |
30. sep. 2019 |
|
Intermediate solutions for quantum resistant key exchange |
30. sep. 2019 |
|
The UiO SecurityLab Robot |
26. sep. 2019 |
|
Cybersecurity |
4. sep. 2019 |
|
Machine-Readable Security Playbooks and Orchestration |
20. aug. 2019 |
|