André Årnes

Orcid: 0009-0006-3780-3677

According to our database1, André Årnes authored at least 21 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evidence in the fog - Triage in fog computing systems.
Forensic Sci. Int. Digit. Investig., March, 2023

Legal Considerations on Gray Zone Operations - From a Norwegian Perspective.
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023

2022
Quantifying data volatility for IoT forensics with examples from Contiki OS.
Digit. Investig., 2022

2021
Coffee forensics - Reconstructing data in IoT devices running Contiki OS.
Digit. Investig., 2021

2018
The reliability of clocks as digital evidence under low voltage conditions.
Digit. Investig., 2018

2017
A big data analytics approach to combat telecommunication vulnerabilities.
Clust. Comput., 2017

2016
A Network Based IMSI Catcher Detection.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Better Protection of SS7 Networks with Machine Learning.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2014
Practical use of Approximate Hash Based Matching in digital investigations.
Digit. Investig., 2014

2011
Storage and exchange formats for digital evidence.
Digit. Investig., 2011

Identifying Malware Using Cross-Evidence Correlation.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2009
The persistence of memory: Forensic identification and extraction of cryptographic keys.
Digit. Investig., 2009

2007
Using a virtual security testbed for digital forensic reconstruction.
J. Comput. Virol., 2007

2006
Using Hidden Markov Models to Evaluate the Risks of Intrusions.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Circumventing IP-address pseudonymization.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2002
Open Access Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002


  Loading...