Export 34 results:
Search results for biblio_year:1991
Filters: 1 is biblio_year:1985 and Author is K.J. Hole  [Reset Search]
2015
K. Hole. "Diversity Reduces the Impact of Malware." IEEE Security & Privacy 13, no. 3 (2015): 48-54.
K. Hole. "Toward Anti-fragility: A Malware-Halting Technique." IEEE Security & Privacy 13, no. 4 (2015): 40-46.
2013
K. Hole. "Management of hidden risks." IEEE Computer 46, no. 1 (2013): 65-70.
2012
L. Nestas and K. Hole. " Building and Maintaining Trust in Internet Voting." IEEE Computer 45, no. 5 (2012): 74-80.
K. Gjøsteen and K. Hole. Helseopplysninger på nett In Letter to there editor in Dagens Næringsliv., 2012.
K. Hole. Nytt sårbarhetsutvalg må til In Feature article in Dagens Næringsliv., 2012.
K. Hole. "Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks." Journal of Computer Networks and Communications 2012 (2012).
2011
K. Hole, K. Gjøsteen, T. Tjøstheim and L. Nestas. Farene ved e-valg In Feature article in Dagbladet., 2011.
K. Hole. Systemene vil svikte In Feature article in Dagens Næringsliv., 2011.
2010
K. Hole and L. Netland. "Toward Risk Assessment of Large-Impact and Rare Events." IEEE Security & Privacy 8, no. 3 (2010): 21-27.
2008
A. Klingsheim and K. Hole. Identity Theft: Much too Easy? A study of Online Systems in Norway In 12th International Conference on Financial Cryptography and Data Security (FC08). Vol. Volume 5143 of the series Lecture Notes in Computer Science., 2008.
K. Hole, L. Netland, Y. Espelid, A. Klingsheim, H. Helleseth and J. Henriksen. "Open Wireless Networks on University Campuses." IEEE Security & Privacy 6, no. 4 (2008): 14-20.
Y. Espelid, L. Netland, A. Klingsheim and K. Hole. A Proof of Concept Attack against Norwegian Internet Banking Systems In 12th International Conference on Financial Cryptography and Data Security (FC08). Vol. Volume 5143 of the series Lecture Notes in Computer Science., 2008.
Y. Espelid, L. Netland, A. Klingsheim and K. Hole. Robbing Banks with Their Own software—an Exploit against Norwegian Online Banks In 23rd International Information Security Conference (SEC 2008). Vol. Volume 278 of the series IFIP – The International Federation for Information Processing . Springer, 2008.
2007
A. Klingsheim, V. Moen and K. Hole. "Challenges in securing networked J2ME applications." IEEE Computer 40, no. 2 (2007): 24-30.
K. Hole, V. Moen, A. Klingsheim and K. Tande. "Lessons from the Norwegian ATM System." IEEE Security & Privacy 5, no. 6 (2007): 25-31.
V. Moen, A. Klingsheim, K. Simonsen and K. Hole. "Vulnerabilities in E-Governments." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2007): 89-100.
2005
K. Hole, E. Dyrnes and P. Thorsheim. "Securing Wi-Fi networks." IEEE Computer 38, no. 7 (2005): 28-34.
2004
G. Oien, H. Holm and K. Hole. "Impact of channel prediction on adaptive coded modulation performance in Rayleigh fading." IEEE Transactions on Vehicular Technology 53, no. 3 (2004): 758-769.
2003
B. Holter, G. Oien, K. Hole and H. Holm. Limitations in spectral efficiency of a rate-adaptive MIMO system utilizing pilot-aided channel prediction In The 57th IEEE Semiannual Vehicular Technology Conference, 2003 (VTC 2003-Spring). Vol. 1., 2003.

Pages