Export 34 results:
Search results for biblio_year:1979
Filters: 1 is biblio_type:Journal Article and 2 is biblio_year:1983 and 3 is biblio_year:1994 and 4 is biblio_type:Talks, contributed and 5 is field_publication_owner:not_simula and 6 is biblio_type:Technical reports and Author is K.J. Hole [Reset Search]
Filters: 1 is biblio_type:Journal Article and 2 is biblio_year:1983 and 3 is biblio_year:1994 and 4 is biblio_type:Talks, contributed and 5 is field_publication_owner:not_simula and 6 is biblio_type:Technical reports and Author is K.J. Hole [Reset Search]
Diversity Reduces the Impact of Malware." IEEE Security & Privacy 13, no. 3 (2015): 48-54.
"Toward Anti-fragility: A Malware-Halting Technique." IEEE Security & Privacy 13, no. 4 (2015): 40-46.
"Management of hidden risks." IEEE Computer 46, no. 1 (2013): 65-70.
" Building and Maintaining Trust in Internet Voting." IEEE Computer 45, no. 5 (2012): 74-80.
"Helseopplysninger på nett In Letter to there editor in Dagens Næringsliv., 2012.
Nytt sårbarhetsutvalg må til In Feature article in Dagens Næringsliv., 2012.
Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks." Journal of Computer Networks and Communications 2012 (2012).
"Farene ved e-valg In Feature article in Dagbladet., 2011.
Systemene vil svikte In Feature article in Dagens Næringsliv., 2011.
Toward Risk Assessment of Large-Impact and Rare Events." IEEE Security & Privacy 8, no. 3 (2010): 21-27.
"Alvorlige svakheter ved e-valg In Letter to editor in Bergens Tidende., 2009.
Når folk stemmer hjemme In Feature article in HUBRO., 2009.
Risk Assessment of a National Security Infrastructure." IEEE Security & Privacy 7, no. 1 (2009): 34-41.
"Identity Theft: Much too Easy? A study of Online Systems in Norway In 12th International Conference on Financial Cryptography and Data Security (FC08). Vol. Volume 5143 of the series Lecture Notes in Computer Science., 2008.
Open Wireless Networks on University Campuses." IEEE Security & Privacy 6, no. 4 (2008): 14-20.
"A Proof of Concept Attack against Norwegian Internet Banking Systems In 12th International Conference on Financial Cryptography and Data Security (FC08). Vol. Volume 5143 of the series Lecture Notes in Computer Science., 2008.
Robbing Banks with Their Own software—an Exploit against Norwegian Online Banks In 23rd International Information Security Conference (SEC 2008). Vol. Volume 278 of the series IFIP – The International Federation for Information Processing . Springer, 2008.
Challenges in securing networked J2ME applications." IEEE Computer 40, no. 2 (2007): 24-30.
"Lessons from the Norwegian ATM System." IEEE Security & Privacy 5, no. 6 (2007): 25-31.
"Vulnerabilities in E-Governments." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2007): 89-100.
"Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter." IEEE Transactions on Vehicular Technology 55, no. 2 (2006): 458-465.
"Case study: online banking security." IEEE Security & Privacy 4, no. 2 (2006): 14-20.
"Securing Wi-Fi networks." IEEE Computer 38, no. 7 (2005): 28-34.
"Impact of channel prediction on adaptive coded modulation performance in Rayleigh fading." IEEE Transactions on Vehicular Technology 53, no. 3 (2004): 758-769.
" Limitations in spectral efficiency of a rate-adaptive MIMO system utilizing pilot-aided channel prediction In The 57th IEEE Semiannual Vehicular Technology Conference, 2003 (VTC 2003-Spring). Vol. 1., 2003.