Vurdering av offensive og defensive cyberkapasiteter |
4. aug. 2022 |
|
Analysis of iCloud Private Relay Security |
17. juni 2022 |
|
Migration from Passwords to FIDO2 |
10. juni 2022 |
|
HTTP/3 Security |
10. juni 2022 |
|
Security of Digital Signatures for PDF |
29. mars 2022 |
|
Post-Quantum Cryptography: Structural lattices-using structure |
22. okt. 2021 |
|
Post-Quantum Cryptography: SIDH |
22. okt. 2021 |
|
Security and Privacy of Media Capturing |
21. okt. 2021 |
|
From VLAN separation to microsegmentation and NSX in a large-scale environment |
21. okt. 2021 |
|
Evading Windows security - AMSI bypass using PowerShell |
20. okt. 2021 |
|
Server-side JavaScript vulnerabilities |
20. okt. 2021 |
|
Reinforcment learning for autonomous incident response |
20. okt. 2021 |
|
Security of Push Notifications in Mobile Apps |
7. okt. 2021 |
|
Verdien av sikkerhetsrevisjoner |
24. sep. 2021 |
|
Måling av informasjonssikkerhet |
24. sep. 2021 |
|
Skybasert verdikjedesikkerhet |
24. sep. 2021 |
|
Sikkerhet i innovasjonsprosesser |
24. sep. 2021 |
|
Trusselmodellering av cybertrusler mot kraftbransjen |
24. sep. 2021 |
|
Industrielle IoT-systemer, IIoT-sikkerhet |
24. sep. 2021 |
|
Skystrategi i samsvar med GDPR |
12. sep. 2021 |
|
Cyber Security |
6. sep. 2021 |
|
Detection, tracking and mapping of IoT devices |
3. sep. 2021 |
|
Cyber Threat Intelligence with STIX and ACT |
31. aug. 2021 |
|
Visualization of Threat Intelligence |
31. aug. 2021 |
|
Developing a Tool for Annotating Threat Reports |
31. aug. 2021 |
|
Securing the Internet of Things |
30. aug. 2021 |
|
Machine learning for Authentication |
30. aug. 2021 |
|
Language-Based Security |
26. aug. 2021 |
|
Formal Methods for Information Security |
26. aug. 2021 |
|
Social Engineering Attacks |
24. aug. 2021 |
|
Machine learning in Malware analysis |
23. aug. 2021 |
|
Malware analysis, detection, and prevention |
23. aug. 2021 |
|
Vulnerabilities and Weaknesses Analysis |
23. aug. 2021 |
|
Security Analysis Methods and Tools |
23. aug. 2021 |
|
Development, Security and Operations (DevSecOps) |
23. aug. 2021 |
|
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence |
14. nov. 2020 |
|
Ethical use cases for onion services |
4. nov. 2020 |
|
Large-scale Study on the FIDO2 Adoption in the Wild |
2. nov. 2020 |
|
Automated Cyber Defense - Open Command and Control (OpenC2) |
31. okt. 2020 |
|
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer |
10. aug. 2020 |
|
Analyse av Secure Multi-party Computation (MPC) |
10. aug. 2020 |
|
Analyse av lettvektsalgoritmer for postkvantekrypto |
10. aug. 2020 |
|
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols |
30. sep. 2019 |
|
Intermediate solutions for quantum resistant key exchange |
30. sep. 2019 |
|
Applied Cyber Security |
29. sep. 2019 |
|
The UiO SecurityLab Robot |
26. sep. 2019 |
|
Malware Detection via Graph Analysis |
21. sep. 2019 |
|
Cybersecurity |
4. sep. 2019 |
|
Authoring Incident Response Actions Taking Into Consideration User Experience |
3. sep. 2019 |
|
Password-less Authentication |
2. sep. 2019 |
|
Machine-Readable Security Playbooks and Orchestration |
20. aug. 2019 |
|
Cloud Security Threat Modelling and Solutions |
22. nov. 2018 |
|
Sikkerhetstesting av SCADA-utstyr |
8. feb. 2018 |
|