University College Research Publications
Recent peer reviewed research publications at Noroff University College include:
Recent peer reviewed research publications at Noroff University College include:
Carthy L, Jernslett R. (2019) Forensic analysis of privacy-focused mobile browsers in Android Devices, BSides Oslo 2019, May 23rd 2019 at MESH.
Martin, E D. Kargaard K. Sutherland I., (2019) Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices, 10th International Conference on Dependable Systems, Services and Technologies, DESSERT 2019, Leeds, United Kingdom, June 5-7, 2019
Carthy L., Little R., Øvensen E., Sutherland I., Read H.O.L. (2018) Committing the perfect crime: A teaching perspective. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway
Yekela, O., Thomson, K.-L., & van Niekerk, J. (2023). Creating a Topic Map for representing Network Security Competencies. Procedia Computer Science.
Xynos K., Read H.O.L., Sutherland I., Bovee M., (2022) Nintendo 2DS/3DS Forensic Examination Tools. Nineteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, SRI International, Arlington, Virginia, USA January 30-31, 2023.
Level 1
Hellebust D., Lawal I A. (2023) Improving Norwegian Translation of Bicycle Terminology Using Custom Named-Entity Recognition and Neural Machine Translation, Electronics 2023, 12(10), 2334. Doi10.3390/electronics12102334
Level 1
Sutherland I., Bovee M., Xynos K., Read H.O.L. (2023) Pre-incident cyber forensic analysis: Legal and ethical issues. ECCWS 2023, 22nd European Conference on Cyber Warfare and Security, Hellenic Air Force Academy (HAFA) and the University of Piraeus, Greece. 22-23 June 2023. DOI: https://doi.org/10.34190/eccws.22.1.358
Level 1
Bortoluzzi,F., Irwin, B. & Westphall, C.M. (2023) A cloud-native framework for globally distributed capture and analysis of Internet Background Radiation. In proceedings of 18th Iberian Conference on Information Systems and Technologies (CISTI’2023). University of Aveiro, Portugal. 20-23 June 2023. DOI: 10.23919/CISTI58278.2023.10211290
Level 0
Drange, Tom (2022): Online Teaching Structure in IT - A Case Study. 14th International Conference on Education and New Learning Technologies, pp. 1174-1181, 4-6 July, 2022, Palma, Spain.
DOI: 10.21125/edulearn.2022.0316
Gunasekaran Manogaran, Bharat S. Rawal, Houbing Song, Huihui Wang, Chinghsien Hsu, Vijayalakshmi Saravanan, Seifedine Nimer Kadry, and P. Mohamed Shakeel. 2022. Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning. ACM Trans. Internet Technol. 22, 2, Article 36 (May 2022), 19 pages. https://doi.org/10.1145/3431500
Level 2
M. S. Paredes and S. Kadry, "Pricing European Options with Deep Learning Models," 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 2022, pp. 106-111, https://doi.org/10.1109/WiDS-PSU54548.2022.00033.
Level 0
Irfan Azhar, Mudassar Raza, Muhammad Sharif, Seifedine Kadry, Seungmin Rho, Union is Strength: Improving face sketch synthesis by fusing outcomes of Fully-Convolutional-Networks and Random Sampling Locality Constraint, Alexandria Engineering Journal, Volume 61, Issue 12, 2022, https://doi.org/10.1016/j.aej.2022.04.007.
Level 1
Abdullah Lakhan, Mazin Abed Mohammed, Seifedine Kadry, Salman A. AlQahtani, Mashael S. Maashi, Karrar Hameed Abdulkareem, Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications, Computers and Electrical Engineering, Volume 100, 2022, 107839, ISSN 0045-7906, https://doi.org/10.1016/j.compeleceng.2022.107839.
Level 1
Imrana, Y.; Xiang, Y.; Ali, L.; Abdul-Rauf, Z.; Hu, Y.-C.; Kadry, S.; Lim, S. χ2-BidLSTM: A Feature Driven Intrusion Detection System Based on χ2 Statistical Model and Bidirectional LSTM. Sensors 2022, 22, 2018. https://doi.org/10.3390/s22052018
Level 1
Geetha, S.; Saha, J.; Dasgupta, I.; Bera, R.; Lawal, I.A.; Kadry, S. Design of Waste Management System Using Ensemble Neural Networks. Designs 2022, 6, 27. https://doi.org/10.3390/designs6020027
Level 1
Muhammad Adeel Azam, Khan Bahadar Khan, Sana Salahuddin, Eid Rehman, Sajid Ali Khan, Muhammad Attique Khan, Seifedine Kadry, Amir H. Gandomi, "A review on multimodal medical image fusion: Compendious analysis of medical modalities, multimodal databases, fusion techniques and quality metrics", in Computers in Biology and Medicine, https://doi.org/10.1016/j.compbiomed.2022.105253
J. Gao, G. Manogaran, T. N. Nguyen, S. Kadry, C. -H. Hsu and P. M. Kumar, "A Vehicle-Consensus Information Exchange Scheme for Traffic Management in Vehicular Ad-Hoc Networks," in IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/TITS.2021.3130087.
Thavavel Vaiyapuri, Ashit Kumar Dutta, Mohamed Yacin Sikkandar, Deepak Gupta, Bader Alouffi, Abdullah Alharbi, Hafiz Tayyab Rauf, Seifedine Kadry,"Design of Metaheuristic Optimization-Based Vascular Segmentation Techniques for Photoacoustic Images",Contrast Media & Molecular Imaging,vol. 2022,Article ID 4736113, 12 pages, 2022. https://doi.org/10.1155/2022/4736113
Nasir Saleem, Jiechao Gao, Muhammad Irfan Khattak, Hafiz Tayyab Rauf, Seifedine Kadry, Muhammad Shafi DeepResGRU: Residual gated recurrent neural network-augmented Kalman filtering for speech enhancement and recognition (2022). Knowledge-Based Systems Volume 238, 28 February 2022, 107914 https://doi.org/10.1016/j.knosys.2021.107914
Rajinikanth, V., Kadry, S., Taniar, D. et al. Detecting epilepsy in EEG signals using synchro-extracting-transform (SET) supported classification technique. J Ambient Intell Human Comput (2022). https://doi.org/10.1007/s12652-021-03676-x
Geslin E 2022 "VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others" January 2022 - Computer and Information Science 15(1) https://doi.org/10.5539/cis.v15np47 License CC BY 4.0 Lab: CNAP https://ccsenet.org/journal/index.php/cis/article/view/0/46656
Heerden, R.V., Leenen, L. and Irwin, B., 2021. Description of a network attack ontology presented formally. In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities (pp. 343-368). Springer, Cham.
Sutherland I., Xynos K, Read H.O.L (2021) Educating the Investigator: Digital Forensics in an embedded environment. ECCWS 2021 20th European Conference on Cyber Warfare and Security, held at the University of Chester, UK.
Martin E D., Sutherland I., Kargaard K, (2021) IoT Security and Forensics: A Case Study. ECCWS 2021 20th European Conference on Cyber Warfare and Security, held at the University of Chester, UK. Also selected for presentation at the Europol Forensics Expert Forum 2021 Virtual Conference, The Hague 22-26 November 2021
Kadry, S. et al.(2021). Social Distancing Enhanced Automated Optimal Design of Physical Spaces in the Wake of the COVID-19 Pandemic. Sustainable Cities and Society. https://doi.org/10.1016/j.scs.2021.102791
Kadry, S. et al.(2021). An agent architecture for autonomous UAV flight control in object classification and recognition missions. Soft Computing. https://doi.org/10.1007/s00500-021-05613-8
Kadry, S. et al.(2021). A hybrid algorithm (BAPSO) for capacity configuration optimization in a distributed solar PV based microgrid. Energy Reports. https://doi.org/10.1016/j.egyr.2021.01.034
Kadry, S. et al.(2021). Cloud Computing-Based Framework for Breast Cancer Diagnosis Using Extreme Learning Machine. Diagnostics. https://doi.org/10.3390/diagnostics11020241
Sarris, D. Xynos K,, Read H.O.L., Sutherland I., (2020) Towards an IoT classification framework, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference
Lawal, IA. (2020). GMDH modelling for mobile user throughput forecasting. In Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC '20). New York, NY, USA, 1021–1025. https://doi.org/10.1145/3341105.3373843
Hammami, N., Lawal, IA., Bedda, M. et al. (2020). Recognition of Arabic speech sound error in children. International Journal of Speech Technology. https://doi.org/10.1007/s10772-020-09746-3
Lawal, IA. and S. Bano, (2020). Deep Human Activity Recognition with Localisation of Wearable Sensors," in IEEE Access, vol. 8, pp. 155060-155070 doi:10.1109/ACCESS.2020.3017681
Khan, Muhidul & Lawal, IA. (2020). Sec-IoT: A framework for secured decentralised IoT using blockchain-based technology. Conference: Fifth International Congress on Information and Communication Technology, London, UK
de Coning A., Mouton F. (2020) Water Distribution Network Leak Detection Management, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference
de Coning A., Mouton F. (2020) Data Processing Automation for Bulk Water Supply Monitoring, Human Centered Computing Conference, HCC2020
Merton Lansley , Francois Mouton , Stelios Kapetanakis & Nikolaos Polatidis (2020) SEADer++: Social engineering attack detection in online environments using machine learning, Journal of Information and Telecommunication, 4:3, 346-362, DOI: 10.1080/24751839.2020.1747001
de Coning A., Mouton F. (2020) Bulk infrastructure management for facilities management, 2020 Resilience Week (RWS) Symposium
Norman Van Wyk, Kevin A. Johnston, Klaus Moeller, Florian Haas (2020) Developing an IT Course for Emerging Technologies Using a Framework – An Example of an IoT Course V1.0 InSITE 2020 2020 pp. 015-045 https://doi.org/10.28945/4521
Sarris, D. Xynos K,, Read H.O.L., Sutherland I., (2020) Towards an IoT classification framework, ECCWS 2020 19th European Conference on Cyber Warfare and Security to be held 25 - 26 June 2020 Online Conference
Cesconetto, J., Silva, L. A., Bortoluzzi, F., Navarro-Cárceres, M., Zeferino, C. A., Leithardt, V. R. Q. PRIPRO Privacy Profiles: User Profiling Management for Smart Environments. Special Issue "Transforming Future Cities: Smart City". Electronics 2020. ISSN 2079-9292.
SD Chindipha, A Herbert and B Irwin. 2019. An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic. in proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC). 1-4 September. Zimbali, South Africa.
SD Chindipha SD, B Irwin B and A Herbert. 2019. Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets. SAICSIT Conference on Digital Eco-systems Gone Wild, Skukuza, South Africa, September 17–18, 2019 (SAICSIT ’19)
Bangani, S., Futcher, L., and Van Niekerk J. (2019). An Approach towards Secure Programming in Undergraduate Computing Curricula. SACLA 2019 - The 48th Annual Conference of the Southern African Computer Lecturers’ Association. Alpine Heath Resort, Northern Drakensberg, South Africa, 15 – 17 July 2019.
Drange, T and Van Wyk, N Social Anxiety – an increasing challenge for educators, EDULEARN19 Proceedings, 11th annual International Conference on Education and New Learning Technologies, Palma de Mallorca (Spain). 1st - 3rd of July, 2019.
Pessolano G., Read H.O.L., Sutherland I., Xynos K., (2019) Forensic Analysis of the Nintendo 3DS NAND, DFRWS-USA July 14-17 Portland, Oregon, USA
Mdunyelwa V., Futcher L., van Niekerk J. (2019) An Educational Intervention for Teaching Secure Coding Practices. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham.
DOI https://doi.org/10.1007/978-3-030-23451-5_1
Bishop M., Dark, M., Futcher, L., Van Niekerk, J., Ngambeki, L., Bose, S., and Zhuet, M.(2019) Learning Principles and the Secure Programming Clinic. In: Drevin L., Theocharidou M. (eds) Information Security Education. Education in Proactive Information Security. WISE 2019. IFIP Advances in Information and Communication Technology, vol 557. Springer, Cham. DOI https://doi.org/10.1007/978-3-030-23451-5_2
Nor G., Sutherland I., Blyth A.J.C. (2019) Automating Aspects of Forensic Case Management. Journal of Information Warfare. Volume 17 Issue 4, 2019
Leppan, R. G., van Niekerk, J. F., Botha, R. A. (2018). Process Model for Differentiated Instruction using Learning Analytics. South African Computer Journal, Volume 30 (2).
Liao, Y.-C. (2018). Investigating the Use of Online Open Source Information As Evidence in European Courts. 13th International Conference on Availability, Reliability and Security (ARES) 27 - 30 August, 2018, Hamburg, Germany. Link: https://doi.org/10.1145/3230833.3232812
Nor G., Sutherland I., Blyth A.J.C. (2018) Concepts of Automating Forensic Case Management. 17th European Conference on Cyber Warfare and Security 28 - 29 June 2018, Oslo, Norway
Awasthi A, Read H.O.L, Xynos K., Sutherland I., (2018) Forensic Analysis of the Almond+ Smart Home Hub Environment: First Impressions, Digital Forensics Research Workshop (DFRWS) -USA Rhode Island, July 15-18, 2018.
Kargaard, J., Drange, T., Kor, A., Tawfik, H. & Butterfield, E. (2018). Defending IT Systems Against Intelligent Malware. 9th International IEEE Conference Dependable Systems, Services and Technologies, May 24-27 2018, Kiev, Ukraine. Winner of Best Paper and Best Presentation in the Security section.
Drange, T and Kargaard, J (2018) Cyberpsychology: Psychological Processes that may Affect Dropout Rates Among Online IT Security Students, CSEDU 2018, the 10th International Conference on Computer Supported Education, Madeira, Portugal, 15-17 March 2018
Read H., Sutherland I., Xynos K., Drange T., Sundt E., (2017) The Impact of Changing Technology on International Cybersecurity Curricula. HCI International 2017 Conference, Vancouver, Canada, 9 - 14 July 2017.
Drange, T. & Kargaard, J. (2017), Increasing student/student and student/lecturer communication through available tools to create a virtual classroom feeling in online education, International Scientific Conference eLearning and Software for Education Conference, Bucharest, Romania on April 27-April 28, 2017.
Drange, T., Irons, A., Kargaard, J. (2017), Creativity in The Digital Forensics Curriculum, 9th International Conference on Computer Supported Education, Porto, Portugal, 21-23 April, 2017.
Morrison, L.C, Read HOL Xynos K., Sutherland I. (2017), Amazon Fire TV Stick: A First Look, Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida on January 30-February 1, 2017.
Drange, T., Burgess, M., Dysvik-Brandt, E., Nor, G., Irons, A., (2016), Blog vs. WIKI as a reflection tool in Moodle: A case study, Proceedings of The WEI International Academic Conference on Education and Humanities, Prague, 30-31 May, 2016
Goodwin M., Drange T. (2016) Teaching Programming to Large Student Groups through Test Driven Development, 8th International Conference on Computer Supported Education — CSEDU 2016 conference (www.csedu.org).
Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org
Gouveia, P., (2015), “Unveil Digital Games with an Ariadne's thread” [“Com um fio de Ariadne desvelam-se os jogos digitai”]. In Carita, A. (2015), Thinking Videogames, Design, Art and Communication [Pensar Videojogos, Design, Arte e Comunicação], Edições Universitárias Lusófonas, ed. 14, ISBN: 978-989-757-030-8, Lisbon.
Read H., Xynos K., Sutherland I., Burgess, M. (2015) Toward using security alerts to assess the impact of network attacks on business processes. NISK 2015 http://itkonferanse.hials.no/en/index.php
Sutherland I., Xynos K., Jones, A., Blyth A.J.C. (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. RUSI Journal, August 2015, Vol. 160, Issue. 4. 2015
DOI:10.1080/03071847.2015.1079044
Rolfhamre, R. (2015). ‘Embellishing La Guitarre Royalle: on experimenting with the Italian passagi practice in Francisco Corbetta’s music.’ Nordic Musicological Congress, 2015-08-11 - 2015-08-14, Aalborg University, Denmark. Peer-reviewed.
Pringle, N., Burgess, M. (2015) "Information assurance in a distributed forensic cluster", Digital Investigation, Vol. 11, No. 1,, pp. S36-S44.
Gouveia, P., (2015), “Serious gaming: how gamers are solving real world problems”. Artech 2015, Seventh International Conference on Digital Arts, Creating Digital E-motions, Óbidos, Portugal. In http://2015.artech-international.org.
Drange, T., Sutherland, I., Irons, A., (2015) Challenges of Interaction in Online Teaching: A Case Study, Proceedings of the Third International Conference on E-Technologies and Business on the Web (EBW2015), Paris, March 26-28, 2015.
Drange, T., Roarson, F., (2015) Reflecting on E-Learning: A Different Challenge, Proceedings of the 11th International Scientific Conference eLearning and Software for Education, Bucharest, April 23-24, 2015.
Drange, T., Kargaard, J., (2015) Changing the Structure of a Moodle Course – A case Study, Proceedings of the 9th International Conference on Interfaces and Human Computer Interaction, Las Palmas, 22-24 July, 2015
Davies, A.,Read, H., Xynos,K. Sutherland I. (2015) Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS-EU 2015, Dublin.
Read, H. Sutherland, I., Xynos, K., Roarson, F., (2015) Locking out the Investigator: The need to circumvent security in embedded systems. Information Security Journal: A Global Perspective.
Sutherland I., Spyridopoulos, T., Read, H., Jones, Sutherland G., Burgess M., (2015) Applying the ACPO guidelines to Building Automation Systems, HCI International 2015 Conference, Los Angeles USA.
Huw Read, H., Xynos, K., Sutherland, I., Roarson, F., Andriotis, P., Tyrfonas, T., Oikonomou G., (2015) An extensible platform for the forensic analysis of social media data, HCI International 2015 Conference, Los Angeles USA.
Gouveia, P., (2014), “A possible narration about portuguese videogames creation. Critical book review: Videogames in Portugal: History, Technology and Art, Nelson Zagalo, 2013”. Aniki, Portuguese Journal of the Moving Image, Vol. 1, nº 2: 369-74 I ISSN 2183-1750 DOI:10.14591/ANIKI.V1N2.69. (In www.aim.org.pt/aniki).
Iain Sutherland, Konstantinos Xynos, Huw Read, Andy Jones, Tom Drange (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, "Security on the Move" 1-3 December, 2014, Perth, Western Australia.
Rolfhamre, R. (2014). "Dissecting transformation: towards a biology of recorded lute sound." Studia musicologica Norvegica 40, pp. 43-62.
Sutherland I., Read, H., Xynos, K. (2014) Forensic analysis of Smart TV: A Current Issue and Call to Arms, Digital Investigation: Special Edition on Embedded Forensics: Edited by Pavel Gladyshev.
Drange, T. (2014) The online generation gap, the millennial student and generation x lecturer, ICHCI 2014 : International Conference on Human Computer Interaction, Lisbon 2014
Gouveia, P., (2013), “Transmedia experience and the independent game industry: the renascence of old school visual and artistic techniques” [Esperiência transmedia e a indústria de jogos independente (indie): o "renascimento" de expressões artísticas e visuais do tipo "old school""], Petry, A. S., Trindade, E., Petry, L. C., Llano, N., (2013), (ed. by), Communication and Social Antropology Seminar [Comunicação e Antropologia Social], International Seminar from the ICCI Network [Seminário Internacional de Rede ICCI Imagens da Cultura Cultura das Imagens]. ECA, USP, São Paulo, Brazil, pp. 78-89. (e-book). ISBN 97885879632. (In http://www2.eca.usp.br/redeicci/ebook/ebook_ICCI_2013.pdf).
Benham A., Read H., Sutherland I., (2013) Network Attack Analysis and the Behavioural Engine, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25-28, 2013.
Blashki K (2013) Emerging Research and Trends in Interactivity and the Human Computer Interface 2013, (Editor)
Blashki K., Murdoch LL., Kristensen M., (2013) The Social Translator: A Game Based learning Simulator to foster cross cultural understanding and adaptation , In; Guest Editor Special Edition of the International Journal of WWW and the Internet
Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, ISSN: 1645-7641
Read H., Xynos K., Sutherland, I., & Blyth A.J.C. (2013) Assessing the impact of security alerts on business activities using DEViSE, Journal of Information Security - January Issue 2013 (Vol. 4, No. 1), (paper 7800124)
Eskeland, S. (2013) A Space-efficient multi-receiver public key algorithm, NISK Conference Stavanger 2013.
Konstantinos Xynos, Iain Sutherland, Andrew Blyth (2013) Effectiveness of blocking evasions in Intrusion Prevention Systems. White paper based on work sponsored by Stonesoft. © 2013 Copyright held by the authors and the University of SouthWales.
Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth (2013) Manipulation of Hard Drive Firmware to Conceal Entire Partitions, Digital Investigation, Volume 10, Issue 4, Pages 281-286 (December 2013) DOI: 10.1016/j.diin.2013.10.001
Rolfhamre, R. (2013) ‘Compact Disc(losure): Some thoughts on the synthesis of recording technology and baroque lute music research’. In Acta musicologica, LXXXV(2), pp. 245-256.
Goodwin, M. Sutherland I., Roarson F., & Drange T., (2012) Assessing the accessibility of e-learning, NOKOBIT November 2012, Bodø, Norway.
Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.
The following Noroff paper was awarded ‘Best in Theme’ and also ‘Best in Conference’ - Sutherland I., Xynos K., Jones, A., Blyth A.J.C., (2012) Protective Emblems in Cyber Warfare, SECAU Security Congress 3-5th December 2012.