• A process framework for information security management 

      Haufe, Knut; Colomo-Palacios, Ricardo; Dzombeta, Srdan; Brandis, Knud; Stantchev, Vladimir (Journal article; Peer reviewed, 2016)
      Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS) is a systematic approach for establishing, implementing, operating, monitoring, ...
    • Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network 

      Barik, Kousik; Misra, Sanjay; Fernandez-Sanz, Luis (Peer reviewed; Journal article, 2024)
      Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks and face challenges such as complex evaluation methods, elevated false positive rates, absence of effective validation, and time-intensive ...
    • Age and Gender Impact on Password Hygiene 

      Juozapavičius, Aušrius; Brilingaite, Agnė; Bukauskas, Linas; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2022)
      Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences ...
    • AI in Context and the Sustainable Development Goals: Factoring in the Unsustainability of the Sociotechnical System 

      Sætra, Henrik Skaug (Peer reviewed; Journal article, 2021-02-05)
      Artificial intelligence (AI) is associated with both positive and negative impacts on both people and planet, and much attention is currently devoted to analyzing and valuating these impacts. In 2015, the UN set 17 Sustainable ...
    • An outlier detection method to improve gathered datasets for network behavior analysis in IoT 

      Shahraki, Amin; Haugen, Øystein (Journal article; Peer reviewed, 2019)
      Outlier detection is a subfield of data mining to determine data points that notably deviate from the rest of a dataset. Their deviation can indicate that these data points are generated by errors and should therefore be ...
    • Application of intervention mapping in cybersecurity education design 

      Pirta-Dreimane, Rūta; Brilingaitė, Agnė; Majore, Ginta; Knox, Benjamin James; Lapin, Kristina; Parish, Karen; Sütterlin, Stefan; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2022)
      Education in Cybersecurity is considered one of the key challenges facing the modern digitized world. Several frameworks, e.g., developed by NIST or ENISA, have defined requirements for cybersecurity education but do not ...
    • Blockchain for requirements traceability: A qualitative approach 

      Demi, Selina; Sánchez-Gordón, Mary; Kristiansen, Monica (Peer reviewed; Journal article, 2022)
      Blockchain technology has emerged as a “disruptive innovation” that has received significant attention in academic and organizational settings. However, most of the existing research is focused on technical issues of ...
    • Canonical Computations in Cellular Automata and Their Application for Reservoir Computing 

      Lindell, Trym A. E.; Hudcová, Barbora; Nichele, Stefano (Peer reviewed; Chapter, 2023)
      Cellular Automata (CAs) have potential as powerful parallel computational systems, which has lead to the use of CAs as reservoirs in reservoir computing. However, why certain Cellular Automaton (CA) rules, sizes and input ...
    • Cascading ISO/IEC 38500 based Balanced Score Cards to improve board accountability 

      Juiz, Carlos; Colomo-Palacios, Ricardo; Gómez, Beatriz (Journal article; Peer reviewed, 2018)
      On one hand, with the standardization of Information Technology (IT) governance through ISO/IEC 38500, in the last decade, a good number of organizations have implemented IT governance (ITG) frameworks, although it is not ...
    • Clustering objectives in wireless sensor networks: A survey and research direction analysis 

      Shahraki, Amin; Taherkordi, Amirhosein; Haugen, Øystein; Eliassen, Frank (Peer reviewed; Journal article, 2020)
      Wireless Sensor Networks (WSNs) typically include thousands of resource-constrained sensors to monitor their surroundings, collect data, and transfer it to remote servers for further processing. Although WSNs are considered ...
    • Convergence of Gamification and Machine Learning: A Systematic Literature Review 

      Khakpour, Alireza; Colomo-Palacios, Ricardo (Peer reviewed; Journal article, 2020-07-12)
      Recent developments in human–computer interaction technologies raised the attention towards gamification techniques, that can be defined as using game elements in a non-gaming context. Furthermore, advancement in machine ...
    • A critical review on Blockchain assessment initiatives: a technology evolution viewpoint 

      Colomo-Palacios, Ricardo; Sánchez-Gordón, Mary; Arias-Aranda, Daniel (Peer reviewed; Journal article, 2020)
      Blockchain is considered as a major emerging technology that is having an everincreasing spread both in industrial and academic contexts. As the usage of blockchain keeps increasing, a fourth generation of blockchain ...
    • Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications 

      Yohanandhan, Rajaa Vikhram; Elavarasan, Rajvikram Madurai; Manoharan, Premkumar; Mihet-Popa, Lucian (Peer reviewed; Journal article, 2020)
      Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention across academia, government, and industry sectors and covers a wide range of applications like agriculture, energy, medical, ...
    • CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education 

      Pirta-Dreimane, Rūta; Brilingaite, Agné; Roponena, Evita; Parish, Karen; Grabis, Janis; Lugo, Ricardo Gregorio; Bonders, Martins (Chapter, 2023)
      Incorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and ...
    • Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey 

      Abbasi, Mahmoud; Shahraki, Amin; Taherkordi, Amirhosein (Peer reviewed; Journal article, 2021)
      Modern communication systems and networks, e.g., Internet of Things (IoT) and cellular networks, generate a massive and heterogeneous amount of traffic data. In such networks, the traditional network management techniques ...
    • Designing personalised mHealth solutions: An overview 

      Rivera-Romero, Octavio; Gabarron, Elia; Ropero, Jorge; Denecke, Kerstin (Peer reviewed; Journal article, 2023)
      Introduction: Mobile health, or mHealth, is based on mobile information and communication technologies and provides solutions for empowering individuals to participate in healthcare. Personalisation techniques have been ...
    • Dynamical Orchestration and Configuration Services in Industrial IoT Systems: An Autonomic Approach 

      Lam, An Ngoc; Haugen, Øystein; Delsing, Jerker (Peer reviewed; Journal article, 2022)
      The Industrial Internet of Things (IIoT) enables the integration of physical devices such as sensors and actuators into the virtual world of automation application systems via different communication protocols. Interoperability ...
    • Embracing the Challenges and Opportunities of Change Through Electronic Collaboration 

      Linnes, Cathrine (Peer reviewed; Journal article, 2020)
      Globalization is a key reason why an organization outsources its activities or creates virtual teams to remain competitive in today’s international market. Organizations are utilizing new technologies to become more efficient ...
    • Enabling interoperable distributed ledger technology with legacy platforms for enterprise digitalization 

      Bokolo, Anthony Junior (Peer reviewed; Journal article, 2023)
      Presently to achieve enterprise digitalization technologies such as Distributed Ledger Technologies (DLT) has now been deployed to support digital services provided by enterprises. But several challenges in DLTs remain to ...
    • Energy consumption in big data environments – a systematic mapping study 

      Pettersen, Erlend; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2018-09)
      Big Data is a term that describes a large volume of structured and unstructured data. Big Data must be acquired, stored, analyzed and visualized by means of non-conventional methods requiring normally a big set of resources, ...