Forskningspublikasjoner, reasearch publications Noroff University College

University College Research Publications

Recent peer reviewed research publications at Noroff University College include:

Forensic analysis of privacy-focused mobile browsers in Android Devices

Carthy L, Jernslett R. (2019) Forensic analysis of privacy-focused mobile browsers in Android Devices, BSides Oslo 2019, May 23rd 2019 at MESH.

Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices

Martin, E D. Kargaard K. Sutherland I., (2019) Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices, 10th International Conference on Dependable Systems, Services and Technologies, DESSERT 2019, Leeds, United Kingdom, June 5-7, 2019

Committing the perfect crime: A teaching perspective

Carthy L., Little R., Øvensen E., Sutherland I., Read H.O.L. (2018) Committing the perfect crime: A teaching perspective. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway


Staff Publications

An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic

SD Chindipha, A Herbert and B Irwin. 2019. An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic. in proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC). 1-4 September. Zimbali, South Africa.

Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets

SD Chindipha SD, B Irwin B and A Herbert. 2019. Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets. SAICSIT Conference on Digital Eco-systems Gone Wild, Skukuza, South Africa, September 17–18, 2019 (SAICSIT ’19)

An Approach towards Secure Programming in Undergraduate Computing

Bangani, S., Futcher, L., and Van Niekerk J. (2019). An Approach towards Secure Programming in Undergraduate Computing Curricula. SACLA 2019 - The 48th Annual Conference of the Southern African Computer Lecturers’ Association. Alpine Heath Resort, Northern Drakensberg, South Africa, 15 – 17 July 2019.

Social Anxiety – an increasing challenge for educators

Drange, T and Van Wyk, N EDULEARN19 Proceedings, 11th annual International Conference on Education and New Learning Technologies, Palma de Mallorca (Spain). 1st - 3rd of July, 2019.

Forensic Analysis of the Nintendo 3DS NAND

Pessolano G., Read H.O.L., Sutherland I., Xynos K., (2019) Forensic Analysis of the Nintendo 3DS NAND, DFRWS-USA July 14-17 Portland, Oregon, USA

An Educational Intervention for Teaching Secure Coding Practices

Mdunyelwa V., Futcher L., van Niekerk J. (2019) An Educational Intervention for Teaching Secure Coding Practices. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham.
DOI https://doi.org/10.1007/978-3-030-23451-5_1

Learning Principles and the Secure Programming Clinic

Bishop M., Dark, M., Futcher, L., Van Niekerk, J., Ngambeki, L., Bose, S., and Zhuet, M.(2019) Learning Principles and the Secure Programming Clinic. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham. DOI https://doi.org/10.1007/978-3-030-23451-5_2

Automating Aspects of Forensic Case Management

Nor G., Sutherland I., Blyth A.J.C. (2019) Automating Aspects of Forensic Case Management. Journal of Information Warfare. Volume 17 Issue 4, 2019

Process Model for Differentiated Instruction using Learning Analytics

Leppan, R. G., van Niekerk, J. F., Botha, R. A. (2018). Process Model for Differentiated Instruction using Learning Analytics. South African Computer Journal, Volume 30 (2).

Investigating the Use of Online Open Source Information as Evidence in European Courts

Liao, Y.-C. (2018). Investigating the Use of Online Open Source Information As Evidence in European Courts. 13th International Conference on Availability, Reliability and Security (ARES) 27 - 30 August, 2018, Hamburg, Germany. Link: https://doi.org/10.1145/3230833.3232812

Concepts of Automating Forensic Case Management

Nor G., Sutherland I., Blyth A.J.C. (2018) Concepts of Automating Forensic Case Management. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway

Forensic Analysis of the Almond+ Smart Home Hub Environment: First Impressions

Awasthi A, Read H.O.L, Xynos K., Sutherland I., (2018) Forensic Analysis of the Almond+ Smart Home Hub Environment: First Impressions, Digital Forensics Research Workshop (DFRWS) -USA Rhode Island, July 15-18, 2018.

Defending IT Systems Against Intelligent Malware

Kargaard, J., Drange, T., Kor, A., Tawfik, H. & Butterfield, E. (2018). Defending IT Systems Against Intelligent Malware. 9th International IEEE Conference Dependable Systems, Services and Technologies, May 24-27 2018, Kiev, Ukraine. Winner of Best Paper and Best Presentation in the Security section.

Cyberpsychology: Psychological Processes that may Affect Dropout Rates Among Online IT Security Students

Drange, T and Kargaard, J (2018) Cyberpsychology: Psychological Processes that may Affect Dropout Rates Among Online IT Security Students, CSEDU 2018, the 10th International Conference on Computer Supported Education, Madeira, Portugal, 15-17 March 2018

The Impact of Changing Technology on International Cybersecurity Curricula

Read H., Sutherland I., Xynos K., Drange T., Sundt E., (2017) The Impact of Changing Technology on International Cybersecurity Curricula. HCI International 2017 Conference, Vancouver, Canada, 9 - 14 July 2017.

Increasing student/student and student/lecturer communication through available tools to create a virtual classroom feeling in online education

Drange, T. & Kargaard, J. (2017), Increasing student/student and student/lecturer communication through available tools to create a virtual classroom feeling in online education, International Scientific Conference eLearning and Software for Education Conference, Bucharest, Romania on April 27-April 28, 2017.

Creativity in The Digital Forensics Curriculum

Drange, T., Irons, A., Kargaard, J. (2017), Creativity in The Digital Forensics Curriculum, 9th International Conference on Computer Supported Education, Porto, Portugal, 21-23 April, 2017.

Amazon Fire TV Stick: A First Look

Morrison, L.C, Read HOL Xynos K., Sutherland I. (2017), Amazon Fire TV Stick: A First Look, Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida on January 30-February 1, 2017.

Blog vs. WIKI as a reflection tool in Moodle: A case study

Drange, T., Burgess, M., Dysvik-Brandt, E., Nor, G., Irons, A., (2016), Blog vs. WIKI as a reflection tool in Moodle: A case study, Proceedings of The WEI International Academic Conference on Education and Humanities, Prague, 30-31 May, 2016

Teaching Programming to Large Student Groups through Test Driven Development

Goodwin M., Drange T. (2016) Teaching Programming to Large Student Groups through Test Driven Development, 8th International Conference on Computer Supported Education — CSEDU 2016 conference (www.csedu.org).

A Forensic Methodology for the Analysis of a Nintendo 3DS

Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org

Unveil Digital Games with an Ariadne's thread

Gouveia, P., (2015), “Unveil Digital Games with an Ariadne's thread” [“Com um fio de Ariadne desvelam-se os jogos digitai”]. In Carita, A. (2015), Thinking Videogames, Design, Art and Communication [Pensar Videojogos, Design, Arte e Comunicação], Edições Universitárias Lusófonas, ed. 14, ISBN: 978-989-757-030-8, Lisbon.

Toward using security alerts to assess the impact of network attacks on business processes

Read H., Xynos K., Sutherland I., Burgess, M. (2015) Toward using security alerts to assess the impact of network attacks on business processes. NISK 2015 http://itkonferanse.hials.no/en/index.php

The Geneva Conventions and Cyber Warfare: A Technical Approach

Sutherland I., Xynos K., Jones, A., Blyth A.J.C. (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. RUSI Journal, August 2015, Vol. 160, Issue. 4. 2015
DOI:10.1080/03071847.2015.1079044

Embellishing La Guitarre Royalle: on experimenting with the Italian passagi practice in Francisco Corbetta’s music

Rolfhamre, R. (2015). ‘Embellishing La Guitarre Royalle: on experimenting with the Italian passagi practice in Francisco Corbetta’s music.’ Nordic Musicological Congress, 2015-08-11 - 2015-08-14, Aalborg University, Denmark. Peer-reviewed.

Information assurance in a distributed forensic cluster

Pringle, N., Burgess, M. (2015) "Information assurance in a distributed forensic cluster", Digital Investigation, Vol. 11, No. 1,, pp. S36-S44.

Serious gaming: how gamers are solving real world problems

Gouveia, P., (2015), “Serious gaming: how gamers are solving real world problems”. Artech 2015, Seventh International Conference on Digital Arts, Creating Digital E-motions, Óbidos, Portugal. In http://2015.artech-international.org​.

Challenges of Interaction in Online Teaching: A Case Study

Drange, T., Sutherland, I., Irons, A., (2015) Challenges of Interaction in Online Teaching: A Case Study, Proceedings of the Third International Conference on E-Technologies and Business on the Web (EBW2015), Paris, March 26-28, 2015.

Reflecting on E-Learning: A Different Challenge

Drange, T., Roarson, F., (2015) Reflecting on E-Learning: A Different Challenge, Proceedings of the 11th International Scientific Conference eLearning and Software for Education, Bucharest, April 23-24, 2015.

Changing the Structure of a Moodle Course – A case Study

Drange, T., Kargaard, J., (2015) Changing the Structure of a Moodle Course – A case Study, Proceedings of the 9th International Conference on Interfaces and Human Computer Interaction, Las Palmas, 22-24 July, 2015

Forensic Analysis of a Sony PlayStation 4: A First Look

Davies, A.,Read, H., Xynos,K. Sutherland I. (2015) Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS-EU 2015, Dublin.

Locking out the Investigator: The need to circumvent security in embedded systems

Read, H. Sutherland, I., Xynos, K., Roarson, F., (2015) Locking out the Investigator: The need to circumvent security in embedded systems. Information Security Journal: A Global Perspective.

Applying the ACPO guidelines to Building Automation Systems

Sutherland I., Spyridopoulos, T., Read, H., Jones, Sutherland G., Burgess M., (2015) Applying the ACPO guidelines to Building Automation Systems, HCI International 2015 Conference, Los Angeles USA.

An extensible platform for the forensic analysis of social media data

Huw Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., Tyrfonas, T., Oikonomou G., (2015) An extensible platform for the forensic analysis of social media data, HCI International 2015 Conference, Los Angeles USA.

A possible narration about portuguese videogames creation.

Gouveia, P., (2014), “A possible narration about portuguese videogames creation. Critical book review: Videogames in Portugal: History, Technology and Art, Nelson Zagalo, 2013”. Aniki, Portuguese Journal of the Moving Image, Vol. 1, nº 2: 369-74 I ISSN 2183-1750 DOI:10.14591/ANIKI.V1N2.69. (In www.aim.org.pt/aniki).

A forensic overview of the LG Smart TV

Iain Sutherland, Konstantinos Xynos, Huw Read, Andy Jones, Tom Drange (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, "Security on the Move" 1-3 December, 2014, Perth, Western Australia.

Dissecting transformation: towards a biology of recorded lute sound

Rolfhamre, R. (2014). "Dissecting transformation: towards a biology of recorded lute sound." Studia musicologica Norvegica 40, pp. 43-62.

Forensic analysis of Smart TV: A Current Issue and Call to Arms, Digital Investigation

Sutherland I., Read, H., Xynos, K. (2014) Forensic analysis of Smart TV: A Current Issue and Call to Arms, Digital Investigation: Special Edition on Embedded Forensics: Edited by Pavel Gladyshev.

The online generation gap, the millennial student and generation x lecturer

Drange, T. (2014) The online generation gap, the millennial student and generation x lecturer, ICHCI 2014 : International Conference on Human Computer Interaction, Lisbon 2014

Transmedia experience and the independent game industry: the renascence of old school visual and artistic techniques

Gouveia, P., (2013), “Transmedia experience and the independent game industry: the renascence of old school visual and artistic techniques” [Esperiência transmedia e a indústria de jogos independente (indie): o "renascimento" de expressões artísticas e visuais do tipo "old school""], Petry, A. S., Trindade, E., Petry, L. C., Llano, N., (2013), (ed. by), Communication and Social Antropology Seminar [Comunicação e Antropologia Social], International Seminar from the ICCI Network [Seminário Internacional de Rede ICCI Imagens da Cultura Cultura das Imagens]. ECA, USP, São Paulo, Brazil, pp. 78-89. (e-book). ISBN 97885879632. (In http://www2.eca.usp.br/redeicci/ebook/ebook_ICCI_2013.pdf).

Network Attack Analysis and the Behavioural Engine

Benham A., Read H., Sutherland I., (2013) Network Attack Analysis and the Behavioural Engine, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.

Emerging Research and Trends

Blashki K (2013) Emerging Research and Trends in Interactivity and the Human Computer Interface 2013, (Editor)

The Social Translator

Blashki K., Murdoch LL., Kristensen M., (2013) The Social Translator: A Game Based learning Simulator to foster cross cultural understanding and adaptation , In; Guest Editor Special Edition of the International Journal of WWW and the Internet

Networked War Games

Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, ISSN: 1645-7641

Assessing the impact of security alerts

Read H., Xynos K., Sutherland, I., & Blyth A.J.C. (2013) Assessing the impact of security alerts on business activities using DEViSE, Journal of Information Security - January Issue 2013 (Vol. 4, No. 1), (paper 7800124)

A Space-efficient multi-receiver public key algorithm

Eskeland, S. (2013) A Space-efficient multi-receiver public key algorithm, NISK Conference Stavanger 2013.

Effectiveness of blocking evasions in Intrusion Prevention Systems

Konstantinos Xynos, Iain Sutherland, Andrew Blyth (2013) Effectiveness of blocking evasions in Intrusion Prevention Systems. White paper based on work sponsored by Stonesoft. © 2013 Copyright held by the authors and the University of SouthWales.

Manipulation of Hard Drive Firmware to Conceal Entire Partitions

Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth (2013) Manipulation of Hard Drive Firmware to Conceal Entire Partitions, Digital Investigation, Volume 10, Issue 4, Pages 281-286 (December 2013) DOI: 10.1016/j.diin.2013.10.001

Compact Disc(losure): Some thoughts on the synthesis of recording technology and baroque lute music research

Rolfhamre, R. (2013) ‘Compact Disc(losure): Some thoughts on the synthesis of recording technology and baroque lute music research’. In Acta musicologica, LXXXV(2), pp. 245-256.

Assessing the accessibility of e-learning

Goodwin, M. Sutherland I., Roarson F., & Drange T., (2012) Assessing the accessibility of e-learning, NOKOBIT November 2012, Bodø, Norway.

Protective Emblems in Cyber Warfare

Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.


Awards:

The following Noroff paper was awarded ‘Best in Theme’ and also ‘Best in Conference’ - Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.

     
Top