Memory Forensics: Techniques and tools for analysing volatile memory |
9. okt. 2023 |
|
Identification and analysis of forensic artifacs in operating systems |
9. okt. 2023 |
|
Threat Indication Using Web Search Engine Trends |
20. aug. 2023 |
|
An Application for Graphically Representing Cybersecurity Operations Playbooks: the CACAO use case |
29. okt. 2022 |
|
Integrated Defense with OASIS Open Command and Control (OpenC2) |
17. okt. 2022 |
|
Open-Source Vulnerabilities in Software Supply Chains |
30. sep. 2022 |
|
Kvalitetsvurdering av setninger som passord |
30. sep. 2022 |
|
Using cryptography insecurely: Don’t do this at home! – But why? |
21. sep. 2022 |
|
Smart contract for an investment and trading platform |
19. sep. 2022 |
|
Deteksjon av sjelden angrepstrafikk med Fourier-analyse |
8. sep. 2022 |
|
Deteksjon av gammel/utdatert programvare |
7. sep. 2022 |
|
Applied Cyber Security |
7. sep. 2022 |
|
Post-quantum kryptografi: Lattice med struktur |
22. okt. 2021 |
|
Post-quantum kryptografi: CSIDH |
22. okt. 2021 |
|
Security and Privacy of Media Capturing |
21. okt. 2021 |
|
From VLAN separation to microsegmentation and NSX in a large-scale environment |
21. okt. 2021 |
|
Visualization of Threat Intelligence |
31. aug. 2021 |
|
Developing a Tool for Annotating Threat Reports |
31. aug. 2021 |
|
Security Analysis Methods and Tools |
23. aug. 2021 |
|
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence |
14. nov. 2020 |
|
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer |
10. aug. 2020 |
|
Analyse av Secure Multi-party Computation (MPC) |
10. aug. 2020 |
|
Analyse av lettvektsalgoritmer for postkvantekrypto |
10. aug. 2020 |
|
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols |
30. sep. 2019 |
|
Intermediate solutions for quantum resistant key exchange |
30. sep. 2019 |
|