Kjell Hole
External collaborator
Publications
Simula-affiliated publications listed
2021
Journal Articles
K. J. Hole and S. Ahmad
A thousand brains: toward biologically constrained AI
SN Applied Sciences
K. J. Hole
Tutorial on systems with antifragility to downtime
Computing
2019
Journal Articles
K. J. Hole and S. Ahmad
Biologically driven AI
IEEE Computer
K. J. Hole
Dominating software systems
IEEE Software
K. J. Hole and C. Otterstad
Software systems with antifragility to downtime
IEEE Computer
2016
Journal Articles
K. J. Hole
Building trust in e-government services
IEEE Computer
O. Lysne, K. J. Hole, C. Otterstad, Ø. Ytrehus, R. Aarseth and J. Tellnes
Vendor malware: detection limits and mitigation
IEEE Computer
Books
K. J. Hole
Anti-fragile ICT Systems
2015
Journal Articles
K. J. Hole
Diversity Reduces the Impact of Malware
IEEE Security & Privacy
K. J. Hole
Toward Anti-fragility: A Malware-Halting Technique
IEEE Security & Privacy
K. J. Hole
Toward anti-fragility: a malware-halting technique
IEEE Security & Privacy
K. J. Hole
Toward anti-fragility: a malware-halting technique
IEEE Security & Privacy
2014
Talks, invited
O. Lysne and K. J. Hole
Hva kan gjøres når man ikke stoler på de som lager utstyret til Ekom-nettet vårt?
Justisdepartementet
Public outreach
H. Raddum and K. J. Hole
Dømt til dårlig sikkerhet
Chronicle in Bergens Tidende
2013
Journal Articles
K. J. Hole
Management of hidden risks
IEEE Computer
2012
Journal Articles
L. Nestas and K. J. Hole
Building and Maintaining Trust in Internet Voting
IEEE Computer
K. J. Hole
Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks
Journal of Computer Networks and Communications
Public outreach
K. Gjøsteen and K. J. Hole
Helseopplysninger på nett
Letter to there editor in Dagens Næringsliv
K. J. Hole
Nytt sårbarhetsutvalg må til
Feature article in Dagens Næringsliv
2011
Public outreach
K. J. Hole, K. Gjøsteen, T. Tjøstheim and L. Nestas
Farene ved e-valg
Feature article in Dagbladet
K. J. Hole
Systemene vil svikte
Feature article in Dagens Næringsliv
2010
Journal Articles
K. J. Hole and L. Netland
Toward Risk Assessment of Large-Impact and Rare Events
IEEE Security & Privacy
Proceedings, refereed
H. Raddum, L. H. Nestås and K. J. Hole
Security Analysis of Mobile Phones Used as OTP Generators
International Workshop on Security Theory and Practice, WISTP 2010
2009
Journal Articles
K. J. Hole, A. Klingsheim, L. Netland, Y. Espelid, T. Tjostheim and V. Moen
Risk Assessment of a National Security Infrastructure
IEEE Security & Privacy
Public outreach
K. J. Hole
Alvorlige svakheter ved e-valg
Letter to editor in Bergens Tidende
H. Raddum, L. Nestas and K. J. Hole
Når folk stemmer hjemme
Feature article in HUBRO
2008
Journal Articles
K. J. Hole, L. Netland, Y. Espelid, A. Klingsheim, H. Helleseth and J. Henriksen
Open Wireless Networks on University Campuses
IEEE Security & Privacy
Proceedings, refereed
Y. Espelid, L. Netland, A. Klingsheim and K. J. Hole
A Proof of Concept Attack against Norwegian Internet Banking Systems
12th International Conference on Financial Cryptography and Data Security (FC08)
A. Klingsheim and K. J. Hole
Identity Theft: Much too Easy? A study of Online Systems in Norway
12th International Conference on Financial Cryptography and Data Security (FC08)
Y. Espelid, L. Netland, A. Klingsheim and K. J. Hole
Robbing Banks with Their Own software—an Exploit against Norwegian Online Banks
23rd International Information Security Conference (SEC 2008)
2007
Journal Articles
A. Klingsheim, V. Moen and K. J. Hole
Challenges in securing networked J2ME applications
IEEE Computer
K. J. Hole, V. Moen, A. Klingsheim and K. Tande
Lessons from the Norwegian ATM System
IEEE Security & Privacy
V. Moen, A. Klingsheim, K. Simonsen and K. J. Hole
Vulnerabilities in E-Governments
International Journal of Electronic Security and Digital Forensics
2006
Journal Articles
D. Duong, G. Oien and K. J. Hole
Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter
IEEE Transactions on Vehicular Technology
K. J. Hole, V. Moen and T. Tjostheim
Case study: online banking security
IEEE Security & Privacy
2005
Journal Articles
K. J. Hole, E. Dyrnes and P. Thorsheim
Securing Wi-Fi networks
IEEE Computer
2004
Journal Articles
G. Oien, H. Holm and K. J. Hole
Impact of channel prediction on adaptive coded modulation performance in Rayleigh fading
IEEE Transactions on Vehicular Technology
V. Moen, H. Raddum and K. J. Hole
Weaknesses in the temporal key hash of WPA
Mobile Computing and Communications Review
2003
Proceedings, refereed
B. Holter, G. Oien, K. J. Hole and H. Holm
Limitations in spectral efficiency of a rate-adaptive MIMO system utilizing pilot-aided channel prediction
The 57th IEEE Semiannual Vehicular Technology Conference, 2003 (VTC 2003-Spring)
2002
Journal Articles
K. J. Hole
New short constraint length rate (n-1)/n punctured convolutional codes for soft-decision Viterbi decoding
IEEE Transactions on Information Theory
2001
Journal Articles
K. J. Hole and G. Oien
Spectral efficiency of adaptive coded modulation in urban microcellular networks
IEEE Transactions on Vehicular Technology
2000
Journal Articles
K. J. Hole, H. Holm and G. Oien
Adaptive multidimensional coded modulation over flat fading channels
IEEE Journal on Selected Areas in Communications (IEEE JSAC)
K. J. Hole
On classes of convolutional codes that are not asymptotically catastrophic
IEEE Transactions on Information Theory
1997
Journal Articles
M. Hole and K. J. Hole
Tight bounds on the minimum average weight per branch for rate (N-1)/N convolutional codes
IEEE Transactions on Information Theory
K. J. Hole
A note on asymptotically catastrophic convolutional codes of rate (n-1)/n
IEEE Transactions on Communications
1995
Journal Articles
K. J. Hole
Cosets of convolutional codes with short maximum zero-run lengths
IEEE Transactions on Information Theory
1994
Journal Articles
K. J. Hole and O. Ytrehus
Improved coding techniques for preceded partial-response channels
IEEE Transactions on Information Theory
1991
Journal Articles
K. J. Hole
Punctured convolutional codes for the 1-D partial-response channel
IEEE Transactions on Information Theory