André Årnes

According to our database1, André Årnes
  • authored at least 16 papers between 2002 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
The reliability of clocks as digital evidence under low voltage conditions.
Digital Investigation, 2018

2017
A big data analytics approach to combat telecommunication vulnerabilities.
Cluster Computing, 2017

2016
A Network Based IMSI Catcher Detection.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Better Protection of SS7 Networks with Machine Learning.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2014
Practical use of Approximate Hash Based Matching in digital investigations.
Digital Investigation, 2014

2011
Storage and exchange formats for digital evidence.
Digital Investigation, 2011

Identifying Malware Using Cross-Evidence Correlation.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2007
Using a virtual security testbed for digital forensic reconstruction.
Journal in Computer Virology, 2007

2006
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Circumventing IP-address pseudonymization.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2002
Open Access Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002


  Loading...