Information and Cyber Security

Tittel Publisert Veileder(e)
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols 30. sep. 2019
Intermediate solutions for quantum resistant key exchange 30. sep. 2019
Applied Cyber Security 29. sep. 2019
Automatic Malware Detection and Analysis 29. sep. 2019
Security logging and SIEM in industrial control systems and industrial internet of things (IIoT) 27. sep. 2019
User authorization and authentication schemes in industrial control systems (ICS) and industrial internet of things (IIoT) 27. sep. 2019
Privacy and Data Protection 27. sep. 2019
The UiO SecurityLab Robot 26. sep. 2019
Malware Detection via Graph Analysis 21. sep. 2019
Graph Analysis on Threat Intelligence Graphs 6. sep. 2019
Cybersecurity 4. sep. 2019
Authoring Incident Response Actions Taking Into Consideration User Experience 3. sep. 2019
Machine-Readable Security Playbooks and Orchestration 20. aug. 2019
Automated Cyber Defense - Open Command and Control (OpenC2) 20. aug. 2019
Cloud Security Threat Modelling and Solutions 22. nov. 2018
Development and Assessment of Adversarially Robust Systems for Classification 20. aug. 2018
Analyzing Approaches to the Problem of AI Safety 20. aug. 2018
Energy Consumption of Security Protocols 16. feb. 2018
OA-TIP: Threat Intelligence Platform 23. nov. 2017
Cyberthreat Detection with Machine Learning 22. nov. 2017
Innebygd personvern i maskinlæring 17. nov. 2017