Einar Snekkenes

Orcid: 0000-0002-2277-6964

According to our database1, Einar Snekkenes authored at least 55 papers between 1990 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Human Behavior Prediction for Risk Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives.
Proceedings of the 5th International Conference on Computer-Human Interaction Research and Applications, 2021

2020
Construction of Human Motivational Profiles by Observation for Risk Analysis.
IEEE Access, 2020

Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review.
Proceedings of the Intelligent Systems and Applications, 2020

Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

2019
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey.
Proceedings of the pHealth 2019 - Proceedings of the 16th International Conference on Wearable Micro and Nano Technologies for Personalized Health, 2019

Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

A Taxonomy of Situations within the Context of Risk Analysis.
Proceedings of the 25th Conference of Open Innovations Association, 2019

Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Framework for Healthcare Security Practice Analysis, Modeling and Incentivization.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, CURF.
Int. J. Inf. Sec., 2018

Unobtrusive Psychological Profiling for Risk Analysis.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Secure Benchmarking using Electronic Voting.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
UnRizkNow: An open electronic community of practice for information security professionals.
Proceedings of the 9th International Conference on Education Technology and Computers, 2017

Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Factors Affecting the Willingness to Share Knowledge in the Communities of Practice.
Proceedings of the Collaboration and Technology - 23rd International Conference, 2017

2016
Using Financial Instruments to Transfer the Information Security Risks.
Future Internet, 2016

2015
EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.
Future Internet, 2015

Design and Performance Aspects of Information Security Prediction Markets for Risk Management.
Proceedings of the SECRYPT 2015, 2015

Managing security trade-offs in the Internet of Things using adaptive security.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Using Prediction Markets to Hedge Information Security Risks.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

A Comparison between Business Process Management and Information Security Management.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

Applicability of Prediction Markets in Information Security Risk Management.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

2013
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Using the Conflicting Incentives Risk Analysis Method.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Layout Dependent Phenomena A New Side-channel Power Model.
J. Comput., 2012

Intended Actions: Risk Is Conflicting Incentives.
Proceedings of the Information Security - 15th International Conference, 2012

2011
User authentication based on foot motion.
Signal Image Video Process., 2011

An approach to measure effectiveness of control for risk analysis with game theory.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Mapping between Classical Risk Management and Game Theoretical Approaches.
Proceedings of the Communications and Multimedia Security, 2011

2010
Using Game Theory to Analyze Risk to Privacy: An Initial Insight.
Proceedings of the Privacy and Identity Management for Life, 2010

Security Implications of Crosstalk in Switching CMOS Gates.
Proceedings of the Information Security - 13th International Conference, 2010

Improved Gait Recognition Performance Using Cycle Matching.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Password Generation and Search Space Reduction.
J. Comput., 2009

Formalizing the ranking of authentication products.
Inf. Manag. Comput. Secur., 2009

Gait Recognition Using Wearable Motion Recording Sensors.
EURASIP J. Adv. Signal Process., 2009

2008
Arm Swing as a Weak Biometric for Unobtrusive User Authentication.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A method for ranking authentication products.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Security and privacy awareness of home PC users in Norway.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Towards understanding the uniqueness of gait biometric.
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008

2007
Spoof Attacks on Gait Authentication System.
IEEE Trans. Inf. Forensics Secur., 2007

Gait Authentication and Identification Using Wearable Accelerometer Sensor.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007

2006
Robustness of Biometric Gait Authentication Against Impersonation Attack.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Wireless Covert Channel on Smart Cards (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Face Recognition Issues in a Border Control Environment.
Proceedings of the Advances in Biometrics, International Conference, 2006

2005
Preface to the special issue on ESORICS 2003.
Int. J. Inf. Sec., 2005

Measuring Resistance to Social Engineering.
Proceedings of the Information Security Practice and Experience, 2005

2004
A classification of malicious software attacks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2001
Concepts for personal location privacy policies.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

1992
Roles in cryptographic protocols.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

1991
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol.
J. Cryptol., 1991

Exploring the BAN Approach to Protocol Analysis.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
Authentication in Open Systems.
Proceedings of the Protocol Specification, 1990

On The Formal Analysis of PKCS Authentication Protocols.
Proceedings of the Advances in Cryptology, 1990


  Loading...