Publications

2016

McCallum, Simon; Nowostawski, Mariusz.

Tillit satt i system, Aftenposten, 2016-04-17, http://www.aftenposten.no/viten/Tillit-satt-i-system-53370b.html

Shalaginov, Andrii; Franke, Katrin. 

Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy, International Journal of Hybrid Intelligent Systems 2016; Volume 13(1) p. 15-26.

Shalaginov, Andrii; Franke, Katrin; Huang, Xiaongwei.

Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification, World Academy of Science, Engineering and Technology: An International Journal of Science, Engineering and Technology 2016; Volume 10(4) p. 617-629.

Shalaginov, Andrii; Grini, Lars Strande; Franke, Katrin.

Understanding Neuro-Fuzzy on a class of multinomial malware detection problems, IEEE World Congress on Computational Intelligence, 2016.

Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christopher.

Cyber Security Risk Assessment of a DDoS Attack, International Conference on Information Security, pp. 183-202, 2016.

2015

Chitrakar, Ambika S.; Petrović, Slobodan.

Approximate search with constraints on indels with application in SPAM filtering, Center for Cyber and Information Security Page 5 of 14 Pb 191, N-2802 Gjøvik, Norway post@ccis.no Proceedings of Norwegian Information Security Conference (NISK-2015), Ålesund, Norway, November 23-25, 2015, pp. 22-33.

Himmel, Julia; Siebler, Nikolas; Laegeler, Felix; Grupe, Marco; Langweg, Hanno.

Privacy Points as a Method to Support Privacy Impact Assessments. I: Proceedings of the 1st International Workshop on Technical and Legal Aspects of Data Privacy and Security (TELERISE 2015). IEEE Computer Society 2015 ISBN 978-1-4673-7097-4. p. 50-53.

Kemmerich,Thomas; Agraval, Vivek; Momsen, Carsten.
Secure Migration to Cloud – In and Out, The Cloud Security Ecosystem, Elsevier 2015, ISBN 978-0-128-01595-7.

Liao, Yi-Ching.
A Survey of Software-based String Matching Algorithms for Forensic Analysis, 10th Annual ADFSL Conference on Digital Forensics, Security and Law.

Liao, Yi-Ching, Langweg, Hanno.
Events and Causal Factors Charting of Kernel Traces for Root Cause Analysis, Third International Workshop on Security and Forensics in Communication Systems in conjunction with IEEE ISCC 2015.

Liao, Yi-Ching, Langweg, Hanno.
Developing Metrics for Surveillance Impact Assessment, First International Workshop on Secure Identity Management in the Cloud Environment in conjunction with IEEE COMPSAC 2015.

Lopez-Rojas, Edgar Alonso; Axelsson Stefan.

Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud, Secure IT Systems, Vol. 9417 of the series Lecture Notes in Computer Science, Springer, pp 156-171.

Shalaginov, Andrii; Franke, Katrin.

Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations. I: 2015 Seventh Intern. Conference of Soft Computing and Pattern Recognition (SoCPaR 2015). IEEE Computer Society 2015 ISBN 978-1-4673-9360-7. s. 31-36

Shalaginov, Andrii; Franke, Katrin.

Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy. NordSec; Poster, 2015-10-19 – 2015-10-21

Shalaginov, Andrii; Franke, Katrin.
A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications. I: Advances in Computational Intelligence; 13th International Work-Conference on Artificial Neural Networks, IWANN 2015, Palma de Mallorca, Spain, June 10-12, 2015. Proceedings, Part II. Springer 2015 ISBN 978-3-319-19222-2. p. 549-563

Shalaginov, Andrii; Franke, Katrin.
A new method of fuzzy patches construction in NeuroFuzzy for malware detection, The 16th World Congress of the International Fuzzy Systems Association (IFSA) and the 9th Conference of the European Society for Fuzzy Logic and Technology (EUSFLAT), Gijon, Spain, 30th June – 3rd July, 2015.

Shalaginov, Andrii; Franke, Katrin.

Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications. I: Hybrid Intelligent Systems – proceedings of 15th International Conference HIS 2015 on Hybrid Intelligent Systems. Springer Publishing Company 2015 ISBN 978-3-319-27220-7. s. 199-210.

Wangen, Gaute; Shalaginov, Andrii.
Quantitative Risk, Statistical methods and the Four Quadrants for Information Security, 10th International Conference on Risks and Security of Internet and Systems, Lesvos, Greece, 20th-22nd July, 2015.

 

2014

Bjelland, Petter Christian; Franke, Katrin; Årnes, Andre.
Practical use of Approximate Hash Based Matching in digital investigations. Digital Investigation. The International Journal of Digital Forensics and Incident Response 2014 ;Volume 11.(May) Suppl. 1 p. S18-S26

Dardick G.S., Endicot-Popowski B., Gladychev, P., Kemmerich T., Rudolph C.
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092), Dagstuhl Reports, Volume 4, Issue 2, 2014

Dehghantanha, Ali; Franke, Katrin.
Privacy-respecting digital investigation. I: 2014 Twelfth Annual Conference on Privacy, Security and Trust; Ryerson University, Toronto, Canada; July 23-24, 2014. IEEE conference proceedings 2014 ISBN 978-1-4799-3503-1. p. 129-138

Liao, Yi-Ching; Langweg, Hanno.
Cost-benefit analysis of kernel tracing systems for forensic readiness. I: Proceedings of the 2nd international workshop on Security and forensics in communication systems. Association for Computing Machinery (ACM) 2014 ISBN 978-1-4503-2802-9. p. 25-36

Liao, Yi-Ching; Langweg, Hanno.
Process Tracking for Forensic Readiness. I: Secure IT Systems; 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings. Springer 2014 ISBN 978-3-319-11599-3. p. 285-286

Liao, Yi-Ching; Langweg, Hanno.
Resource-Based Event Reconstruction of Digital Crime Scenes. I: Proceedings of 2014 IEEE Joint Intelligence and Security Informatics Conference. IEEE Computer Society 2014 ISBN 978-1-4799-6363-8. p. 129-136

Kemmerich T., Junge F., Kuntze, N., Rudolph C., Endicot-Popowski B., Großkopf L.
Generation and Handling of Hard Drive Duplicates as Piece of Evidence: Proceedings of the conference on Digital Forensics, Security and Law, 2014

Nordvik, Rune; Liao, Yi-Ching; Langweg, Hanno.
AccountabilityFS: A File System Monitor for Forensic Readiness. I: Proceedings of 2014 IEEE Joint Intelligence and Security Informatics Conference. IEEE Computer Society 2014 ISBN 978-1-4799-6363-8. p. 308-311

Petrovic, Slobodan.
A new linear consistency test attack on noised irregularly clocked linear feedback shift registers. XIII Spanish Meeting on Cryptology and Information Security (RECSI 2014); 2014-09-02 – 2014-09-04

Yang, Bian; Chu, Huiguang; Li, Guoqiang; Petrovic, Slobodan; Busch, Christoph.
Cloud Password Manager Using Privacy-Preserved Biometrics. I: Proceedings of IEEE International Conference on Cloud Engineering (IC2E 2014); 10–14 March 2014, Boston, Massachusetts. IEEE Computer Society 2014 ISBN 978-1-4799-3766-0. s. 505-509

2013

Abt, Sebastian; Dietz, Christian; Baier, Harald; Petrovic, Slobodan.
Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow. I: Emerging Management Mechanisms for the Future Internet. 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings. Springer 2013 ISBN 978-3-642-38998-6. s. 148-159

Chitrakar, Ambika Shrestha; Franke, Katrin.
Author Identification from Text-based Communications: Identifying generalized features and computational methods. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse – NISK 2013 – Stavanger, 18th-20th November 2013. Akademika forlag 2013 ISBN 978-82-321-0366-9. p. 37-48

Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen.
Advancing Digital Forensics. I: Information Assurance and Security Education and Training. Springer 2013 ISBN 978-3-642-39377-8. p. 288-295

Hayashi, Yu-Ichi; Homma, Naofumi; Watanabe, Takashi; Price, William O.; Radasky, William A..
Introduction to the Special Section on Electromagnetic Information Security. IEEE transactions on electromagnetic compatibility (Print) 2013 ;Volume 55.(3) p. 539-546

Liao, Yi-Ching; Langweg, Hanno.
A Survey of Process Activity Tracking Systems. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse – NISK 2013 – Stavanger, 18th-20th November 2013. Akademika forlag 2013 ISBN 978-82-321-0366-9. p. 49-60

Nguyen, Hai Thanh; Torrano-Gimenez, Carmen; Alvarez, Gonzalo; Franke, Katrin; Petrovic, Slobodan.
Enhancing the effectiveness of Web Application Firewalls by generic feature selection. Logic journal of the IGPL (Print) 2013 ;Volume 21.(4) p. 560-570

Shalaginov, Andrii; Franke, Katrin.
Automatic rule-mining for malware detection employing Neuro-Fuzzy Approach. I: Proceeding of Norwegian Information Security Conference / Norsk informasjonssikkerhetskonferanse – NISK 2013 – Stavanger, 18th-20th November 2013. Akademika forlag 2013 ISBN 978-82-321-0366-9. p. 100-111

2012

Berg, Peter Ekstrand; Franke, Katrin; Nguyen, Hai Thanh.
Generic feature selection measure for botnet malware detection. I: Proceedings of the 12th International Conference on Intelligent Systems Design and Applications (ISDA); 27 – 29 November 2012; Kochi, India. IEEE conference proceedings 2012 ISBN 978-1-4673-5119-5. p. 711-717

Chanda, Sukalpa; Franke, Katrin; Pal, U.
Clustering Document Fragments using Background Color and Texture Information. Proceedings of SPIE, the International Society for Optical Engineering2012 ;Volume 8297. p. –

Chanda, Sukalpa; Franke, Katrin; Pal, Umapada.
Text Independent Writer Identification for Oriya Script. I: 10th IAPR International Workshop on Document Analysis Systems, DAS 2012. IEEE Computer Society 2012 ISBN 978-0-7695-4661-2. p. 369-373

Chanda, Sukalpa; Pal, Umapada; Franke, Katrin.
Font identification — In context of an Indic script. I: Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012); November 11-15, 2012; Tsukuba, Japan. IEEE conference proceedings 2012 ISBN 978-4-9906441-0-9. p. 1655-1658

Chanda, Sukalpa; Pal, Umapada; Franke, Katrin.
Similar shaped part-based character recognition using G-SURF. I: Proceedings of the 12th International Conference on Hybrid Intelligent Systems (HIS); 4-7 December 2012; Pune, India. IEEE conference proceedings 2012 ISBN 9781467351164. p. 179-184

Imran, Ali Shariq; Chanda, Sukalpa; Alaya Cheikh, Faouzi; Franke, Katrin; Pal, Umapada.
Cursive Handwritten Segmentation and Recognition for Instructional Videos. I: SITIS 2012, The 8th International Conference on Signal Image Technology and Internet Based Systems; 25-29, November 2012, Sorrento – Naples, Italy. IEEE Computer Society 2012 ISBN 978-1-4673-5152-2. p. 155-160

Nguyen, Hai Thanh; Franke, Katrin.
A General Lp-norm Support Vector Machine via Mixed 0-1 Programming. I: Machine Learning and Data Mining in Pattern Recognition, 8th International Conference; MLDM 2012, Berlin, Germany, July 13-20, 2012. Proceedings. Springer 2012 ISBN 9783642315367. p. 40-49

Nguyen, Hai Thanh; Franke, Katrin.
Adaptive Intrusion Detection System via Online Machine Learning. I: Proceedings of the 12th International Conference on Hybrid Intelligent Systems (HIS); 4-7 December 2012; Pune, India. IEEE conference proceedings 2012 ISBN 9781467351164. p. 271-277

Nguyen, Hai Thanh; Franke, Katrin.
An Unified Framework of Machine Learning via Mixed 0-1 Linear Programming. The Mixed Integer Programming (MIP) workshop; 2012-07-16 – 2012-07-19

Nguyen, Hai Thanh; Franke, Katrin.
Feature Selection for Information Security and Digital Forensics: Methods and Challenges. From Data to Knowledge, Machine-Learning with Real-time and Streaming Applications; 2012-05-07 – 2012-05-11

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Feature Extraction Methods for Intrusion Detection Systems. I: Threats, Countermeasures, and Advances in Applied Information Security. IGI Global 2012 ISBN 9781466609785. p. 23-52

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Reliability in A Feature-Selection Process for Intrusion Detection. I: Reliable Knowledge Discovery. Springer 2012 ISBN 978-1-4614-1902-0. p. 203-218

Pal, Srikanta; Chanda, Sukalpa; Pal, Umapada; Franke, Katrin; Blumenstein, Michael.
Off-line signature verification using G-SURF. I: Proceedings of the 12th International Conference on Intelligent Systems Design and Applications (ISDA); 27 – 29 November 2012; Kochi, India. IEEE conference proceedings 2012 ISBN 978-1-4673-5119-5. p. 586-591

Petrovic, Slobodan.
Application of linear consistency test in a ciphertext-only attack on irregularly clocked linear feedback shift registers. XII Spanish Meeting on Cryptology and Information Security (RECSI 2012); 2012-09-04 – 2012-09-07
HIG

Torrano-Gimenez, Carmen; Nguyen, Hai Thanh; Alvarez, Gonzalo; Franke, Katrin.
Combining expert knowledge with automatic feature extraction for reliable web attack detection. Security and Communication Networks 2012

Wold, Knut; Petrovic, Slobodan.
Security properties of oscillator rings in true random number generators. I: Proceedings of the IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS); April 18-20, 2012; Tallinn, Estonia. IEEE conference proceedings 2012 ISBN 9781467311885. s. 145-150
HIG

2011

Berg, Peter Ekstrand; Franke, Katrin; Nguyen, Hai Thanh.
Feature Selection for Botnet Malware Detection. 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011); 2011-07-07 – 2011-07-08

Chanda, Sukalpa; Franke, Katrin; Umapada, Pal.
Identification of Indic Scripts on Torn-Documents. I: ICDAR 2011, Proceedings of the 11th International Conference on Document Analysis and Recognition; 18-21 September 2011, Beijing, China. IEEE Computer Society 2011 ISBN 978-0-7695-4520-2. p. 713-717

Flaglien, Anders Orsten; Franke, Katrin; Årnes, Andre.
Identifying Malware Using Cross-Evidence Correlation. I: Advances in Digital Forensics VII; 7th IFIP WG 11.9 International Conference on Digital Forensics Orlando, FL, USA, January 31 – February 2, 2011; Revised Selected Papers. Springer 2011 ISBN 978-3-642-24211-3. p. 169-182

Flaglien, Anders Orsten; Mallasvik, Aleksander; Mustorp, Magnus; Årnes, Andre.
Storage and exchange formats for digital evidence. Digital Investigation. The International Journal of Digital Forensics and Incident Response 2011 ;Volume 8.(2) p. 122-128

Hartung, Daniel; Wold, Knut; Graffi, Kalman; Petrovic, Slobodan.
Towards a Biometric Random Number Generator – A General Approach For True Random Extraction From Biometric Samples. I: BIOSIG 2011, Proceedings – International Conference of the Biometrics Special Interest Group; 8.-9. September 2011 in Darmstadt. Gesellschaft für Informatik 2011 ISBN 978-3-88579-285-7. s. 267-274
HIG

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
A General L1-norm Support Vector Machine for Feature Selection. I: Proceedings of 2011 3rd International Conference on Machine Learning and Computing. IEEE Press 2011 ISBN 978-1-4244-9252-7. p. V1-591-V1-595

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
A New Ensemble-Feature-Selection Framework for Intrusion Detection. I: ISDA 2011, Proceedings of the 11th International Conference on Intelligent Systems Design and Applications; 22 – 24 November 2011, Córdoba, Spain. IEEE conference proceedings 2011 ISBN 978-1-4577-1675-1. p. 213-218

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Feature Selection via Mixed 0-1 Programming Problem. 18th Machine Learning Summer School; 2011-09-04 – 2011-09-17

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. International Journal on Mobile Computing and Multimedia Communications 2011 ;Volume 3.(1) p. 21-34

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
On General Definition of L1-norm Support Vector Machines for Feature Selection. International Journal of Machine Learning and Computing 2011 ;Volume 1.(3)

Nguyen, Hai Thanh; Torrano-Gimenez, Carmen; Alvarez, Gonzalo; Petrovic, Slobodan; Franke, Katrin.
Application of the Generic Feature Selection Measure in Detection of Web Attacks. I: Computational Intelligence in Security for Information Systems4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings. Springer 2011 ISBN 9783642213229. p. 25-32

Sako, Hiroshi; Franke, Katrin; Saitoh, Shuji.
Computational Forensics; 4th International Workshop, IWCF 2010, Tokyo, Japan, November 11-12, 2010, Revised Selected Papers. Springer 2011 (ISBN 978-3-642-19375-0) 223 p. Lecture Notes in Computer Science(6540)

Torrano-Gimenez, Carmen; Nguyen, Hai Thanh; Alvarez, Gonzalo; Petrovic, Slobodan; Franke, Katrin.
Applying feature selection to payload-based web application firewalls. I: Proceedings of the 3rd International Workshop On Securityand Communication Networks (IWSCN 2011), 18-20 May, 2011, Gjøvik, Norway. Gjøvik: Høgskolen i Gjøvik 2011 ISBN 978-82-91313-67-2. p. 75-81

Watanabe, Takashi; Franke, Katrin; Sako, Hiroshi.
Towards large-scale EM-leakage evaluation by means of automated TOE synchronisation. I: Proceedings of 10th International Symposium on Electromagnetic Compatibility, EMC 2011; September 26-30, 2011, York, UK. IEEE conference proceedings 2011 ISBN 9781457708114. p. 937-941

Wold, Knut; Petrovic, Slobodan.

Behavioral model of TRNG based on oscillator rings implemented in FPGA. I: Proceedings of 14th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS. IEEE Press 2011 ISBN 978-1-4244-9754-6. s. 163-166
HIG

2010

Chanda, Sukalpa; Franke, Katrin; Pal, Umapada.
Document-Zone Classification in Torn Documents. I: ICFHR 2010 : 12th International Conference on Frontiers in HandwritingRecognition, ICFHR 2010, Kolkata, India, 16-18 November 2010. IEEE Computer Society 2010 ISBN 978-0-7695-4221-8. p. 25-30

Chanda, Sukalpa; Franke, Katrin; Pal, Umapada.
Structural handwritten and machine print classification for sparse content and arbitrary oriented document fragments. I: Proceedings of the 2010 ACM Symposium on Applied Computing, Sierre, Switzerland, March 22-26, 2010, (SAC’10). ACM Press 2010 ISBN 978-1-60558-639-7. p. 18-22

Chanda, Sukalpa; Franke, Katrin; Pal, Umapada; Wakabayashi, Tetsushi.
Text Independent Writer Identification for Bengali Script. I: Proceedings of the 20th International Conference on Pattern Recognition (ICPR) 2010. IEEE Computer Society 2010 ISBN 9781424475421. p. 2005-2008

Chanda, Sukalpa; Pal, Umapada; Franke, Katrin; Kimura, Fumitaka.
Script Identification – A Han and Roman Script Perspective. I: Proceedings of the 20th International Conference on Pattern Recognition (ICPR) 2010. IEEE Computer Society 2010 ISBN 9781424475421. p. 2708-2711

Flaglien, Anders Orsten; Mallasvik, Aleksander; Mustorp, Magnus; Årnes, Andre.
Storage and exchange formats for digital evidence. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. p. 146-158

Houten, Wiger van; Geradts, Zeno J. M. H.; Franke, Katrin; Veenman, Cor J..
Verification of Video Source Camera Competition. I: Recognizing Patterns in Signals, Speech, Images and Videos, ICPR 2010. Springer 2010 ISBN 9783642177101. p. 22-28

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Improving effectiveness of intrusion detection by correlation feature selection. I: Proceedings of the Fifth International Conference on Avaliability, Reliability and Security: ARES 2010. IEEE Computer Society 2010 ISBN 9780769539652. p. 17-24

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Towards a Generic Feature-Selection Measure for Intrusion Detection. I: Proceedings of the 2010 20th International Conference on Pattern Recognition. IEEE Computer Society 2010 ISBN 978-0-7695-4109-9. p. 1529-1532

Nguyen, Hai Thanh; Petrovic, Slobodan; Franke, Katrin.
A Comparison of Feature-Selection Methods for Intrusion Detection. I: Computer Network Security. Springer 2010 ISBN 9783642147067. p. 242-255

Wold, Knut; Petrovic, Slobodan.
Robustness of TRNG against attacks that employ superimposing signal on FPGA supply voltage. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. p. 81-92

2009

Blankers, V.L.; Heuvel, C.E. van den; Franke, Katrin; Vuurpijl, L.G..
Signature Verification Competition. I: ICDAR ’09. 10th International Conference on Document Analysis and Recognition, 2009. IEEE Computer Society 2009 ISBN 9781424445004. p. 1403-1407

Chanda, Sukalpa; Pal, Srikanta; Franke, Katrin; Pal, Umapada.
Two-stage Approach for Word-wise Script Identification. I: ICDAR ’09. 10th International Conference on Document Analysis and Recognition, 2009. IEEE Computer Society 2009 ISBN 9781424445004. p. 926-930

Franke, Katrin.
Analysis of Authentic Signatures and Forgeries. I: Computational Forensics. Springer 2009 ISBN 9783642035203. p. 150-164

Franke, Katrin.
Capturing Reliable Data for Computer-based Forensic Handwriting Analysis II:: Pen-position Activations. I: ICDAR ’09. 10th International Conference on Document Analysis and Recognition, 2009. IEEE Computer Society 2009 ISBN 9781424445004. p. 1310-1314

Franke, Katrin.
Computational Forensics: Application and Challenges in the Computer-based Analysis of Signatures. 14th Biennial Conference of the International Graphonomics Society; 2009-08-13 – 2009-08-16

Geradts, Zeno J. M. H.; Franke, Katrin; Veenman, Cor J..
Computational Forensics. Springer 2009 (ISBN 9783642035203) (5718/2009)

Geradts, Zeno J.M.H.; Franke, Katrin; Veenman, Cor J..
Computational Forensics. Springer 2009 (ISBN 9783642035203) 180 p. Lecture Notes in Computer Science(5718)

Maartmann-Moe, Carsten; Thorkildsen, Steffen E.; Årnes, Andre.
The persistence of memory: Forensic identification and extraction of cryptographic keys. Digital Investigation. The International Journal of Digital Forensics and Incident Response 2009 ;Volume 6. Suppl. 1 p. S132-S140

Nguyen, Hai Thanh; Franke, Katrin; Petrovic, Slobodan.
Optimizing a Class of Feature Selection Measures. NIPS 2009 Workshop on Discrete Optimization in Machine Learning: Submodularity, Sparsity & Polyhedra (DISCML); 2009-12-07 – 2009-12-12

Petrovic, Slobodan; Franke, Katrin.
A New Two-Stage Search Procedure for Misuse Detection. International Journal of Security and Its Applications2009 ;Volume 3.(3) p. 55-62

Wold, Knut; Petrovic, Slobodan.
Optimizing speed of a true random number generator in FPGA by spectral analysis. I: Proceedings of the fourth international conference on computer sciences and convergence information technology (ICCIT), Seoul, Korea, November 2009. IEEE Computer Society 2009 ISBN 9780769538969. p. 1105-1110

2008

Petrovic, Slobodan; Bakke, Sverre.
Application of q-gram distance in digital forensic search. I: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008. Proceedings. Springer 2008 p. 159-168

Petrovic, Slobodan; Bakke, Sverre.
Improving the efficiency of misuse detection by means of the q-gram distance. I: Information Assurance and Security, 2008. ISIAS ’08. Fourth International Conference on Information Assurance and Security. IEEE conference proceedings 2008 p. 205-208

2007

Petrovic, Slobodan; Franke, Katrin.
A new two-stage search procedure for misuse detection. I: Future Generation Communication and Networking. IEEE conference proceedings 2007 p. 418-422

Petrovic, Slobodan; Franke, Katrin.
Improving the efficiency of digital forensic search by means of the constrained edit distance. I: Proceedings of the Third International Symposium on Information Assurance and Security. IEEE conference proceedings 2007 p. 405-410

Petrovic, Slobodan; Fuster-Sabater, Amparo.
Reconstruction of suboptimal paths in the constrained edit distance array with application in cryptanalysis. I:Computational Science and Its Applications. Springer 2007 p. 597-610

Seeberg, Vidar Evenrud; Petrovic, Slobodan.
A new classification scheme for anonymization of real data used in ids benchmarking. I: Proceedings of the The Second International Conference on Availability, Reliability and Security. IEEE Computer Society 2007 p. 385-390

2006

Årnes, André.
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. Third International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006); 2006-07-13 – 2006-07-14

Årnes, André.
Sporer datakurker. Gemini [Newspaper] 2006-09-30

Årnes, Andre.
Risk, Privacy, and Security in Computer Networks. Trondheim: Tapir Uttrykk 2006 (ISBN 82-471-8235-1) 411 p. Doktoravhandlinger ved NTNU(2006:227)

Årnes, André; Haas, Paul; Vigna, Giovanni; Kemmerer, Richard A..
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. Lecture Notes in Computer Science 2006 ;Volume 4064. p. 144-163

Årnes, Andre; Haas, Paul; Vigna, Giovanni; Kemmerer, Richard A..
Using a Virtual Security Testbed for Digital Forensic Reconstruction. Journal in Computer Virology 2006

Årnes, Andre; Sallhammar, Karin; Haslum, Kjetil; Knapskog, Svein Johan.
Real-time Risk Assessment with Network Sensors and Hidden Markov Models. 11th Nordic Workshop on Secure IT Systems; 2006-10-19 – 2006-10-20

Årnes, André; Valeur, Fredrik; Vigna, Giovanni; Kemmerer, Richard A..
Using Hidden Markov Models to Evaluate the Risks of Intrusions — System Architecture and Model Validation. 9th International Symposium on Recent Advances in Intrusion Detection (RAID); 2006-09-20 – 2006-09-22

Årnes, André; Valeur, Fredrik; Vigna, Giovanni; Kemmerer, Richard A..
Using Hidden Markov Models to Evaluate the Risks of Intrusions — System architecture and Model Validation.Lecture Notes in Computer Science 2006 ;Volume 4219. p. 145-164

Brekne, Tønnes; Årnes, André; Øslebø, Arne.
Anonymization of IP Traffic Monitoring Data — Attacks on Two Prefix-preserving Anonymization Schemes and Some Proposed Remedies. Lecture Notes in Computer Science 2006 ;Volume 3856. p. 179-196

Haslum, Kjetil; Årnes, Andre.
Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models. I: Proceedings of the 2006 International Conference on Computational Intelligence and Security. IEEE Computer Society 2006 ISBN 1-4244-0604-8. p. 1536-1540

Petrovic, Slobodan.
A Comparison Between the Silhouette Index and the Davies- Bouldin Index in Labelling IDS Clusters. NORDSEC 2006; 2006-10-19 – 2006-10-20

Petrovic, Slobodan; Álvarez, Gonzalo; Orfila, Agustín; Carbó, Javier.
Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques. I:Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 2006. HICSS ’06. IEEE conference proceedings 2006

Petrovic, Slobodan; Alvarez, Gonzalo; Orfila, Agustin; Carbo, Javier.
Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques. I:Proceedings of the 39th Hawaii International Conference on System Sciences – 2006. IEEE conference proceedings 2006 p. 8-