Forskningspublikasjoner, reasearch publications Noroff University College

University College Research Publications

Recent peer reviewed research publications at Noroff University College include:

Forensic analysis of privacy-focused mobile browsers in Android Devices

Carthy L, Jernslett R. (2019) Forensic analysis of privacy-focused mobile browsers in Android Devices, BSides Oslo 2019, May 23rd 2019 at MESH.

Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices

Martin, E D. Kargaard K. Sutherland I., (2019) Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices, 10th International Conference on Dependable Systems, Services and Technologies, DESSERT 2019, Leeds, United Kingdom, June 5-7, 2019

Committing the perfect crime: A teaching perspective

Carthy L., Little R., Øvensen E., Sutherland I., Read H.O.L. (2018) Committing the perfect crime: A teaching perspective. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway


Staff Publications

Creating a Topic Map for representing Network Security Competencies

Yekela, O., Thomson, K.-L., & van Niekerk, J. (2023). Creating a Topic Map for representing Network Security Competencies. Procedia Computer Science.

Nintendo 2DS/3DS Forensic Examination Tools

Xynos K., Read H.O.L., Sutherland I., Bovee M., (2022) Nintendo 2DS/3DS Forensic Examination Tools. Nineteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, SRI International, Arlington, Virginia, USA January 30-31, 2023.
Level 1

Improving Norwegian Translation of Bicycle Terminology Using Custom Named-Entity Recognition and Neural Machine Translation

Hellebust D., Lawal I A. (2023) Improving Norwegian Translation of Bicycle Terminology Using Custom Named-Entity Recognition and Neural Machine Translation, Electronics 2023, 12(10), 2334. Doi10.3390/electronics12102334
Level 1

Pre-incident cyber forensic analysis: Legal and ethical issues

Sutherland I., Bovee M., Xynos K., Read H.O.L. (2023) Pre-incident cyber forensic analysis: Legal and ethical issues. ECCWS 2023, 22nd European Conference on Cyber Warfare and Security, Hellenic Air Force Academy (HAFA) and the University of Piraeus, Greece. 22-23 June 2023. DOI: https://doi.org/10.34190/eccws.22.1.358
Level 1

A cloud-native framework for globally distributed capture and analysis of Internet Background Radiation

Bortoluzzi,F., Irwin, B. & Westphall, C.M. (2023) A cloud-native framework for globally distributed capture and analysis of Internet Background Radiation. In proceedings of 18th Iberian Conference on Information Systems and Technologies (CISTI’2023). University of Aveiro, Portugal. 20-23 June 2023. DOI: 10.23919/CISTI58278.2023.10211290
Level 0

Online Teaching Structure in IT - A Case Study

Drange, Tom (2022): Online Teaching Structure in IT - A Case Study. 14th International Conference on Education and New Learning Technologies, pp. 1174-1181, 4-6 July, 2022, Palma, Spain.
DOI: 10.21125/edulearn.2022.0316

Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning

Gunasekaran Manogaran, Bharat S. Rawal, Houbing Song, Huihui Wang, Chinghsien Hsu, Vijayalakshmi Saravanan, Seifedine Nimer Kadry, and P. Mohamed Shakeel. 2022. Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning. ACM Trans. Internet Technol. 22, 2, Article 36 (May 2022), 19 pages. https://doi.org/10.1145/3431500
Level 2

Pricing European Options with Deep Learning Models

M. S. Paredes and S. Kadry, "Pricing European Options with Deep Learning Models," 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 2022, pp. 106-111, https://doi.org/10.1109/WiDS-PSU54548.2022.00033.
Level 0

Union is Strength: Improving face sketch synthesis by fusing outcomes of Fully-Convolutional-Networks and Random Sampling Locality Constraint

Irfan Azhar, Mudassar Raza, Muhammad Sharif, Seifedine Kadry, Seungmin Rho, Union is Strength: Improving face sketch synthesis by fusing outcomes of Fully-Convolutional-Networks and Random Sampling Locality Constraint, Alexandria Engineering Journal, Volume 61, Issue 12, 2022, https://doi.org/10.1016/j.aej.2022.04.007.
Level 1

Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications, Computers and Electrical Engineering

Abdullah Lakhan, Mazin Abed Mohammed, Seifedine Kadry, Salman A. AlQahtani, Mashael S. Maashi, Karrar Hameed Abdulkareem, Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications, Computers and Electrical Engineering, Volume 100, 2022, 107839, ISSN 0045-7906, https://doi.org/10.1016/j.compeleceng.2022.107839.
Level 1

A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM

Imrana, Y.; Xiang, Y.; Ali, L.; Abdul-Rauf, Z.; Hu, Y.-C.; Kadry, S.; Lim, S. χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM. Sensors 2022, 22, 2018. https://doi.org/10.3390/s22052018
Level 1

Design of Waste Management System Using Ensemble Neural Networks

Geetha, S.; Saha, J.; Dasgupta, I.; Bera, R.; Lawal, I.A.; Kadry, S. Design of Waste Management System Using Ensemble Neural Networks. Designs 2022, 6, 27. https://doi.org/10.3390/designs6020027
Level 1

A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics

Muhammad Adeel Azam, Khan Bahadar Khan, Sana Salahuddin, Eid Rehman, Sajid Ali Khan, Muhammad Attique Khan, Seifedine Kadry, Amir H. Gandomi, "A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics", in Computers in Biology and Medicine, https://doi.org/10.1016/j.compbiomed.2022.105253

A Vehicle-Consensus Information Exchange Scheme for Traffic Management in Vehicular Ad-Hoc Networks

J. Gao, G. Manogaran, T. N. Nguyen, S. Kadry, C. -H. Hsu and P. M. Kumar, "A Vehicle-Consensus Information Exchange Scheme for Traffic Management in Vehicular Ad-Hoc Networks," in IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2021.3130087.

Design of Metaheuristic Optimization-Based Vascular Segmentation Techniques for Photoacoustic Images

Thavavel Vaiyapuri, Ashit Kumar Dutta, Mohamed Yacin Sikkandar, Deepak Gupta, Bader Alouffi, Abdullah Alharbi, Hafiz Tayyab Rauf, Seifedine Kadry,"Design of Metaheuristic Optimization-Based Vascular Segmentation Techniques for Photoacoustic Images",Contrast Media & Molecular Imaging,vol. 2022,Article ID 4736113, 12 pages, 2022. https://doi.org/10.1155/2022/4736113

DeepResGRU: Residual gated recurrent neural network-augmented Kalman filtering for speech enhancement and recognition

Nasir Saleem, Jiechao Gao, Muhammad Irfan Khattak, Hafiz Tayyab Rauf, Seifedine Kadry, Muhammad Shafi DeepResGRU: Residual gated recurrent neural network-augmented Kalman filtering for speech enhancement and recognition (2022). Knowledge-Based Systems Volume 238, 28 February 2022, 107914 https://doi.org/10.1016/j.knosys.2021.107914

Detecting epilepsy in EEG signals using synchro-extracting-transform (SET) supported classification technique

Rajinikanth, V., Kadry, S., Taniar, D. et al. Detecting epilepsy in EEG signals using synchro-extracting-transform (SET) supported classification technique. J Ambient Intell Human Comput (2022). https://doi.org/10.1007/s12652-021-03676-x

VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others

Geslin E 2022 "VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others" January 2022 - Computer and Information Science 15(1) https://doi.org/10.5539/cis.v15np47 License CC BY 4.0 Lab: CNAP https://ccsenet.org/journal/index.php/cis/article/view/0/46656

Description of a network attack ontology presented formally

Heerden, R.V., Leenen, L. and Irwin, B., 2021. Description of a network attack ontology presented formally. In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities (pp. 343-368). Springer, Cham.

Educating the Investigator: Digital Forensics in an embedded environment

Sutherland I., Xynos K, Read H.O.L (2021) Educating the Investigator: Digital Forensics in an embedded environment. ECCWS 2021 20th European Conference on Cyber Warfare and Security, held at the University of Chester, UK.

IoT Security and Forensics: A Case Study

Martin E D., Sutherland I., Kargaard K, (2021) IoT Security and Forensics: A Case Study. ECCWS 2021 20th European Conference on Cyber Warfare and Security, held at the University of Chester, UK. Also selected for presentation at the Europol Forensics Expert Forum 2021 Virtual Conference, The Hague 22-26 November 2021

Social Distancing Enhanced Automated Optimal Design of Physical Spaces in the Wake of the COVID-19 Pandemic

Kadry, S. et al.(2021). Social Distancing Enhanced Automated Optimal Design of Physical Spaces in the Wake of the COVID-19 Pandemic. Sustainable Cities and Society. https://doi.org/10.1016/j.scs.2021.102791

An agent architecture for autonomous UAV flight control in object classification and recognition missions

Kadry, S. et al.(2021). An agent architecture for autonomous UAV flight control in object classification and recognition missions. Soft Computing. https://doi.org/10.1007/s00500-021-05613-8

A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid

Kadry, S. et al.(2021). A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energy Reports. https://doi.org/10.1016/j.egyr.2021.01.034

Cloud Computing-Based Framework for Breast Cancer Diagnosis Using Extreme Learning Machine

Kadry, S. et al.(2021). Cloud Computing-Based Framework for Breast Cancer Diagnosis Using Extreme Learning Machine. Diagnostics. https://doi.org/10.3390/diagnostics11020241

Towards an IoT classification framework

Sarris, D. Xynos K,, Read H.O.L., Sutherland I., (2020) Towards an IoT classification framework, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference

GMDH modelling for mobile user throughput forecasting

Lawal, IA. (2020). GMDH modelling for mobile user throughput forecasting. In Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC '20). New York, NY, USA, 1021–1025. https://doi.org/10.1145/3341105.3373843

Recognition of Arabic speech sound error in children

Hammami, N., Lawal, IA., Bedda, M. et al. (2020). Recognition of Arabic speech sound error in children. International Journal of Speech Technology. https://doi.org/10.1007/s10772-020-09746-3

Deep Human Activity Recognition with Localisation of Wearable Sensors

Lawal, IA. and S. Bano, (2020). Deep Human Activity Recognition with Localisation of Wearable Sensors," in IEEE Access, vol. 8, pp. 155060-155070 doi:10.1109/ACCESS.2020.3017681

Sec-IoT: A framework for secured decentralised IoT using blockchain-based technology

Khan, Muhidul & Lawal, IA. (2020). Sec-IoT: A framework for secured decentralised IoT using blockchain-based technology. Conference: Fifth International Congress on Information and Communication Technology, London, UK

Water Distribution Network Leak Detection Management

de Coning A., Mouton F. (2020) Water Distribution Network Leak Detection Management, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference

Data Processing Automation for Bulk Water Supply Monitoring

de Coning A., Mouton F. (2020) Data Processing Automation for Bulk Water Supply Monitoring, Human Centered Computing Conference, HCC2020

Social engineering attack detection in online environments using machine learning

Merton Lansley , Francois Mouton , Stelios Kapetanakis & Nikolaos Polatidis (2020) SEADer++: Social engineering attack detection in online environments using machine learning, Journal of Information and Telecommunication, 4:3, 346-362, DOI: 10.1080/24751839.2020.1747001

Bulk infrastructure management for facilities management

de Coning A., Mouton F. (2020) Bulk infrastructure management for facilities management, 2020 Resilience Week (RWS) Symposium

Developing an IT Course for Emerging Technologies Using a Framework – An Example of an IoT Course

Norman Van Wyk, Kevin A. Johnston, Klaus Moeller, Florian Haas (2020) Developing an IT Course for Emerging Technologies Using a Framework – An Example of an IoT Course V1.0 InSITE 2020  2020  pp. 015-045 https://doi.org/10.28945/4521

Towards an IoT classification framework

Sarris, D. Xynos K,, Read H.O.L., Sutherland I., (2020) Towards an IoT classification framework, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference

Privacy Profiles: User Profiling Management for Smart Environments

Cesconetto, J., Silva, L. A., Bortoluzzi, F., Navarro-Cárceres, M., Zeferino, C. A., Leithardt, V. R. Q. PRIPRO Privacy Profiles: User Profiling Management for Smart Environments. Special Issue "Transforming Future Cities: Smart City". Electronics 2020. ISSN 2079-9292.

An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic

SD Chindipha, A Herbert and B Irwin. 2019. An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic. in proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC). 1-4 September. Zimbali, South Africa.

Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets

SD Chindipha SD, B Irwin B and A Herbert. 2019. Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets. SAICSIT Conference on Digital Eco-systems Gone Wild, Skukuza, South Africa, September 17–18, 2019 (SAICSIT ’19)

An Approach towards Secure Programming in Undergraduate Computing

Bangani, S., Futcher, L., and Van Niekerk J. (2019). An Approach towards Secure Programming in Undergraduate Computing Curricula. SACLA 2019 - The 48th Annual Conference of the Southern African Computer Lecturers’ Association. Alpine Heath Resort, Northern Drakensberg, South Africa, 15 – 17 July 2019.

Social Anxiety – an increasing challenge for educators

Drange, T and Van Wyk, N Social Anxiety – an increasing challenge for educators, EDULEARN19 Proceedings, 11th annual International Conference on Education and New Learning Technologies, Palma de Mallorca (Spain). 1st - 3rd of July, 2019.

Forensic Analysis of the Nintendo 3DS NAND

Pessolano G., Read H.O.L., Sutherland I., Xynos K., (2019) Forensic Analysis of the Nintendo 3DS NAND, DFRWS-USA July 14-17 Portland, Oregon, USA

An Educational Intervention for Teaching Secure Coding Practices

Mdunyelwa V., Futcher L., van Niekerk J. (2019) An Educational Intervention for Teaching Secure Coding Practices. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham.
DOI https://doi.org/10.1007/978-3-030-23451-5_1

Learning Principles and the Secure Programming Clinic

Bishop M., Dark, M., Futcher, L., Van Niekerk, J., Ngambeki, L., Bose, S., and Zhuet, M.(2019) Learning Principles and the Secure Programming Clinic. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham. DOI https://doi.org/10.1007/978-3-030-23451-5_2

Automating Aspects of Forensic Case Management

Nor G., Sutherland I., Blyth A.J.C. (2019) Automating Aspects of Forensic Case Management. Journal of Information Warfare. Volume 17 Issue 4, 2019

Process Model for Differentiated Instruction using Learning Analytics

Leppan, R. G., van Niekerk, J. F., Botha, R. A. (2018). Process Model for Differentiated Instruction using Learning Analytics. South African Computer Journal, Volume 30 (2).

Investigating the Use of Online Open Source Information as Evidence in European Courts

Liao, Y.-C. (2018). Investigating the Use of Online Open Source Information As Evidence in European Courts. 13th International Conference on Availability, Reliability and Security (ARES) 27 - 30 August, 2018, Hamburg, Germany. Link: https://doi.org/10.1145/3230833.3232812

Concepts of Automating Forensic Case Management

Nor G., Sutherland I., Blyth A.J.C. (2018) Concepts of Automating Forensic Case Management. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway

Forensic Analysis of the Almond+ Smart Home Hub Environment: First Impressions

Awasthi A, Read H.O.L, Xynos K., Sutherland I., (2018) Forensic Analysis of the Almond+ Smart Home Hub Environment: First Impressions, Digital Forensics Research Workshop (DFRWS) -USA Rhode Island, July 15-18, 2018.

Defending IT Systems Against Intelligent Malware

Kargaard, J., Drange, T., Kor, A., Tawfik, H. & Butterfield, E. (2018). Defending IT Systems Against Intelligent Malware. 9th International IEEE Conference Dependable Systems, Services and Technologies, May 24-27 2018, Kiev, Ukraine. Winner of Best Paper and Best Presentation in the Security section.

Cyberpsychology: Psychological Processes that may Affect Dropout Rates Among Online IT Security Students

Drange, T and Kargaard, J (2018) Cyberpsychology: Psychological Processes that may Affect Dropout Rates Among Online IT Security Students, CSEDU 2018, the 10th International Conference on Computer Supported Education, Madeira, Portugal, 15-17 March 2018

The Impact of Changing Technology on International Cybersecurity Curricula

Read H., Sutherland I., Xynos K., Drange T., Sundt E., (2017) The Impact of Changing Technology on International Cybersecurity Curricula. HCI International 2017 Conference, Vancouver, Canada, 9 - 14 July 2017.

Increasing student/student and student/lecturer communication through available tools to create a virtual classroom feeling in online education

Drange, T. & Kargaard, J. (2017), Increasing student/student and student/lecturer communication through available tools to create a virtual classroom feeling in online education, International Scientific Conference eLearning and Software for Education Conference, Bucharest, Romania on April 27-April 28, 2017.

Creativity in The Digital Forensics Curriculum

Drange, T., Irons, A., Kargaard, J. (2017), Creativity in The Digital Forensics Curriculum, 9th International Conference on Computer Supported Education, Porto, Portugal, 21-23 April, 2017.

Amazon Fire TV Stick: A First Look

Morrison, L.C, Read HOL Xynos K., Sutherland I. (2017), Amazon Fire TV Stick: A First Look, Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida on January 30-February 1, 2017.

Blog vs. WIKI as a reflection tool in Moodle: A case study

Drange, T., Burgess, M., Dysvik-Brandt, E., Nor, G., Irons, A., (2016), Blog vs. WIKI as a reflection tool in Moodle: A case study, Proceedings of The WEI International Academic Conference on Education and Humanities, Prague, 30-31 May, 2016

Teaching Programming to Large Student Groups through Test Driven Development

Goodwin M., Drange T. (2016) Teaching Programming to Large Student Groups through Test Driven Development, 8th International Conference on Computer Supported Education — CSEDU 2016 conference (www.csedu.org).

A Forensic Methodology for the Analysis of a Nintendo 3DS

Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org

Unveil Digital Games with an Ariadne's thread

Gouveia, P., (2015), “Unveil Digital Games with an Ariadne's thread” [“Com um fio de Ariadne desvelam-se os jogos digitai”]. In Carita, A. (2015), Thinking Videogames, Design, Art and Communication [Pensar Videojogos, Design, Arte e Comunicação], Edições Universitárias Lusófonas, ed. 14, ISBN: 978-989-757-030-8, Lisbon.

Toward using security alerts to assess the impact of network attacks on business processes

Read H., Xynos K., Sutherland I., Burgess, M. (2015) Toward using security alerts to assess the impact of network attacks on business processes. NISK 2015 http://itkonferanse.hials.no/en/index.php

The Geneva Conventions and Cyber Warfare: A Technical Approach

Sutherland I., Xynos K., Jones, A., Blyth A.J.C. (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. RUSI Journal, August 2015, Vol. 160, Issue. 4. 2015
DOI:10.1080/03071847.2015.1079044

Embellishing La Guitarre Royalle: on experimenting with the Italian passagi practice in Francisco Corbetta’s music

Rolfhamre, R. (2015). ‘Embellishing La Guitarre Royalle: on experimenting with the Italian passagi practice in Francisco Corbetta’s music.’ Nordic Musicological Congress, 2015-08-11 - 2015-08-14, Aalborg University, Denmark. Peer-reviewed.

Information assurance in a distributed forensic cluster

Pringle, N., Burgess, M. (2015) "Information assurance in a distributed forensic cluster", Digital Investigation, Vol. 11, No. 1,, pp. S36-S44.

Serious gaming: how gamers are solving real world problems

Gouveia, P., (2015), “Serious gaming: how gamers are solving real world problems”. Artech 2015, Seventh International Conference on Digital Arts, Creating Digital E-motions, Óbidos, Portugal. In http://2015.artech-international.org​.

Challenges of Interaction in Online Teaching: A Case Study

Drange, T., Sutherland, I., Irons, A., (2015) Challenges of Interaction in Online Teaching: A Case Study, Proceedings of the Third International Conference on E-Technologies and Business on the Web (EBW2015), Paris, March 26-28, 2015.

Reflecting on E-Learning: A Different Challenge

Drange, T., Roarson, F., (2015) Reflecting on E-Learning: A Different Challenge, Proceedings of the 11th International Scientific Conference eLearning and Software for Education, Bucharest, April 23-24, 2015.

Changing the Structure of a Moodle Course – A case Study

Drange, T., Kargaard, J., (2015) Changing the Structure of a Moodle Course – A case Study, Proceedings of the 9th International Conference on Interfaces and Human Computer Interaction, Las Palmas, 22-24 July, 2015

Forensic Analysis of a Sony PlayStation 4: A First Look

Davies, A.,Read, H., Xynos,K. Sutherland I. (2015) Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS-EU 2015, Dublin.

Locking out the Investigator: The need to circumvent security in embedded systems

Read, H. Sutherland, I., Xynos, K., Roarson, F., (2015) Locking out the Investigator: The need to circumvent security in embedded systems. Information Security Journal: A Global Perspective.

Applying the ACPO guidelines to Building Automation Systems

Sutherland I., Spyridopoulos, T., Read, H., Jones, Sutherland G., Burgess M., (2015) Applying the ACPO guidelines to Building Automation Systems, HCI International 2015 Conference, Los Angeles USA.

An extensible platform for the forensic analysis of social media data

Huw Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., Tyrfonas, T., Oikonomou G., (2015) An extensible platform for the forensic analysis of social media data, HCI International 2015 Conference, Los Angeles USA.

A possible narration about portuguese videogames creation.

Gouveia, P., (2014), “A possible narration about portuguese videogames creation. Critical book review: Videogames in Portugal: History, Technology and Art, Nelson Zagalo, 2013”. Aniki, Portuguese Journal of the Moving Image, Vol. 1, nº 2: 369-74 I ISSN 2183-1750 DOI:10.14591/ANIKI.V1N2.69. (In www.aim.org.pt/aniki).

A forensic overview of the LG Smart TV

Iain Sutherland, Konstantinos Xynos, Huw Read, Andy Jones, Tom Drange (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, "Security on the Move" 1-3 December, 2014, Perth, Western Australia.

Dissecting transformation: towards a biology of recorded lute sound

Rolfhamre, R. (2014). "Dissecting transformation: towards a biology of recorded lute sound." Studia musicologica Norvegica 40, pp. 43-62.

Forensic analysis of Smart TV: A Current Issue and Call to Arms, Digital Investigation

Sutherland I., Read, H., Xynos, K. (2014) Forensic analysis of Smart TV: A Current Issue and Call to Arms, Digital Investigation: Special Edition on Embedded Forensics: Edited by Pavel Gladyshev.

The online generation gap, the millennial student and generation x lecturer

Drange, T. (2014) The online generation gap, the millennial student and generation x lecturer, ICHCI 2014 : International Conference on Human Computer Interaction, Lisbon 2014

Transmedia experience and the independent game industry: the renascence of old school visual and artistic techniques

Gouveia, P., (2013), “Transmedia experience and the independent game industry: the renascence of old school visual and artistic techniques” [Esperiência transmedia e a indústria de jogos independente (indie): o "renascimento" de expressões artísticas e visuais do tipo "old school""], Petry, A. S., Trindade, E., Petry, L. C., Llano, N., (2013), (ed. by), Communication and Social Antropology Seminar [Comunicação e Antropologia Social], International Seminar from the ICCI Network [Seminário Internacional de Rede ICCI Imagens da Cultura Cultura das Imagens]. ECA, USP, São Paulo, Brazil, pp. 78-89. (e-book). ISBN 97885879632. (In http://www2.eca.usp.br/redeicci/ebook/ebook_ICCI_2013.pdf).

Network Attack Analysis and the Behavioural Engine

Benham A., Read H., Sutherland I., (2013) Network Attack Analysis and the Behavioural Engine, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.

Emerging Research and Trends

Blashki K (2013) Emerging Research and Trends in Interactivity and the Human Computer Interface 2013, (Editor)

The Social Translator

Blashki K., Murdoch LL., Kristensen M., (2013) The Social Translator: A Game Based learning Simulator to foster cross cultural understanding and adaptation , In; Guest Editor Special Edition of the International Journal of WWW and the Internet

Networked War Games

Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, ISSN: 1645-7641

Assessing the impact of security alerts

Read H., Xynos K., Sutherland, I., & Blyth A.J.C. (2013) Assessing the impact of security alerts on business activities using DEViSE, Journal of Information Security - January Issue 2013 (Vol. 4, No. 1), (paper 7800124)

A Space-efficient multi-receiver public key algorithm

Eskeland, S. (2013) A Space-efficient multi-receiver public key algorithm, NISK Conference Stavanger 2013.

Effectiveness of blocking evasions in Intrusion Prevention Systems

Konstantinos Xynos, Iain Sutherland, Andrew Blyth (2013) Effectiveness of blocking evasions in Intrusion Prevention Systems. White paper based on work sponsored by Stonesoft. © 2013 Copyright held by the authors and the University of SouthWales.

Manipulation of Hard Drive Firmware to Conceal Entire Partitions

Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth (2013) Manipulation of Hard Drive Firmware to Conceal Entire Partitions, Digital Investigation, Volume 10, Issue 4, Pages 281-286 (December 2013) DOI: 10.1016/j.diin.2013.10.001

Compact Disc(losure): Some thoughts on the synthesis of recording technology and baroque lute music research

Rolfhamre, R. (2013) ‘Compact Disc(losure): Some thoughts on the synthesis of recording technology and baroque lute music research’. In Acta musicologica, LXXXV(2), pp. 245-256.

Assessing the accessibility of e-learning

Goodwin, M. Sutherland I., Roarson F., & Drange T., (2012) Assessing the accessibility of e-learning, NOKOBIT November 2012, Bodø, Norway.

Protective Emblems in Cyber Warfare

Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.


Awards:

The following Noroff paper was awarded ‘Best in Theme’ and also ‘Best in Conference’ - Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.

     
Top