Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Einar Snekkenes
@inproceedings{DBLP:conf/chira/SzekeresS21, author = {Adam Szekeres and Einar Snekkenes}, editor = {Hugo Pl{\'{a}}cido da Silva and Larry L. Constantine and Andreas Holzinger}, title = {Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives}, booktitle = {Proceedings of the 5th International Conference on Computer-Human Interaction Research and Applications, {CHIRA} 2021, Online Streaming, October 28-29, 2021}, pages = {70--80}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010663400003060}, doi = {10.5220/0010663400003060}, timestamp = {Fri, 19 Nov 2021 13:46:58 +0100}, biburl = {https://dblp.org/rec/conf/chira/SzekeresS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/SzekeresS21, author = {Adam Szekeres and Einar Snekkenes}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Chiara Garau and Ivan Blecic and David Taniar and Bernady O. Apduhan and Ana Maria A. C. Rocha and Eufemia Tarantino and Carmelo Maria Torre}, title = {Human Behavior Prediction for Risk Analysis}, booktitle = {Computational Science and Its Applications - {ICCSA} 2021 - 21st International Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12951}, pages = {288--303}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86970-0\_21}, doi = {10.1007/978-3-030-86970-0\_21}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/SzekeresS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SzekeresS20, author = {Adam Szekeres and Einar Arthur Snekkenes}, title = {Construction of Human Motivational Profiles by Observation for Risk Analysis}, journal = {{IEEE} Access}, volume = {8}, pages = {45096--45107}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2976633}, doi = {10.1109/ACCESS.2020.2976633}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SzekeresS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gramsec/SzekeresS20, author = {Adam Szekeres and Einar Snekkenes}, editor = {Harley Eades III and Olga Gadyatskaya}, title = {Representing Decision-Makers in {SGAM-H:} The Smart Grid Architecture Model Extended with the Human Layer}, booktitle = {Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12419}, pages = {87--110}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62230-5\_5}, doi = {10.1007/978-3-030-62230-5\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gramsec/SzekeresS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intellisys/YengNWYS20, author = {Prosper Kandabongee Yeng and Livinus Obiora Nweke and Ashenafi Zebene Woldaregay and Bian Yang and Einar Arthur Snekkenes}, editor = {Kohei Arai and Supriya Kapoor and Rahul Bhatia}, title = {Data-Driven and Artificial Intelligence {(AI)} Approach for Modelling and Analyzing Healthcare Security Practice: {A} Systematic Review}, booktitle = {Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference, IntelliSys 2020, London, UK, September 3-4, 2020, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {1250}, pages = {1--18}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55180-3\_1}, doi = {10.1007/978-3-030-55180-3\_1}, timestamp = {Tue, 08 Dec 2020 11:58:53 +0100}, biburl = {https://dblp.org/rec/conf/intellisys/YengNWYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/YengYS19, author = {Prosper Kandabongee Yeng and Bian Yang and Einar Arthur Snekkenes}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {Framework for Healthcare Security Practice Analysis, Modeling and Incentivization}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {3242--3251}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006529}, doi = {10.1109/BIGDATA47090.2019.9006529}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/YengYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/YengYS19, author = {Prosper Kandabongee Yeng and Bian Yang and Einar Snekkenes}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2}, pages = {397--404}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.10239}, doi = {10.1109/COMPSAC.2019.10239}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/compsac/YengYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fruct/SzekeresS19, author = {Adam Szekeres and Einar Arthur Snekkenes}, title = {A Taxonomy of Situations within the Context of Risk Analysis}, booktitle = {25th Conference of Open Innovations Association, {FRUCT} 2019, Helsinki, Finland, November 5-8, 2019}, pages = {306--316}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/FRUCT48121.2019.8981536}, doi = {10.23919/FRUCT48121.2019.8981536}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fruct/SzekeresS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/SzekeresWS19, author = {Adam Szekeres and Pankaj Shivdayal Wasnik and Einar Arthur Snekkenes}, editor = {Joaquim Filipe and Michal Smialek and Alexander Brodsky and Slimane Hammoudi}, title = {Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation}, booktitle = {Proceedings of the 21st International Conference on Enterprise Information Systems, {ICEIS} 2019, Heraklion, Crete, Greece, May 3-5, 2019, Volume 2}, pages = {377--389}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007694203770389}, doi = {10.5220/0007694203770389}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/iceis/SzekeresWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/phealth/YengYS19, author = {Prosper Kandabongee Yeng and Bian Yang and Einar Arthur Snekkenes}, editor = {Bernd Blobel and Mauro Giacomini}, title = {Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: {A} Literature Survey}, booktitle = {pHealth 2019 - Proceedings of the 16th International Conference on Wearable Micro and Nano Technologies for Personalized Health - 10-12 June 2019, Genoa, Italy}, series = {Studies in Health Technology and Informatics}, volume = {261}, pages = {239--245}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/978-1-61499-975-1-239}, doi = {10.3233/978-1-61499-975-1-239}, timestamp = {Tue, 11 Jun 2019 09:53:56 +0200}, biburl = {https://dblp.org/rec/conf/phealth/YengYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangenHS18, author = {Gaute Wangen and Christoffer Hallstensen and Einar Snekkenes}, title = {A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, {CURF}}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {681--699}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0382-0}, doi = {10.1007/S10207-017-0382-0}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangenHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AgrawalS18, author = {Vivek Agrawal and Einar Arthur Snekkenes}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Secure Benchmarking using Electronic Voting}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {191--206}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006827801910206}, doi = {10.5220/0006827801910206}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/AgrawalS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/SzekeresS18, author = {Adam Szekeres and Einar Arthur Snekkenes}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Unobtrusive Psychological Profiling for Risk Analysis}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {376--386}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006858803760386}, doi = {10.5220/0006858803760386}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/SzekeresS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/criwg/AgrawalS17, author = {Vivek Agrawal and Einar Arthur Snekkenes}, editor = {Carl Gutwin and Sergio F. Ochoa and Julita Vassileva and Tomoo Inoue}, title = {Factors Affecting the Willingness to Share Knowledge in the Communities of Practice}, booktitle = {Collaboration and Technology - 23rd International Conference, {CRIWG} 2017, Saskatoon, SK, Canada, August 9-11, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10391}, pages = {32--39}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63874-4\_3}, doi = {10.1007/978-3-319-63874-4\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/criwg/AgrawalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/AgrawalWS17, author = {Vivek Agrawal and Pankaj Wasnik and Einar Arthur Snekkenes}, editor = {Kecheng Liu and Ana Carolina Salgado and Jorge Bernardino and Joaquim Filipe}, title = {Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice}, booktitle = {Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - (Volume 3), Funchal, Madeira, Portugal, November 1-3, 2017}, pages = {50--60}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006498500500060}, doi = {10.5220/0006498500500060}, timestamp = {Tue, 23 Jan 2018 15:23:42 +0100}, biburl = {https://dblp.org/rec/conf/ic3k/AgrawalWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icetc/AgrawalS17, author = {Vivek Agrawal and Einar Arthur Snekkenes}, title = {UnRizkNow: An open electronic community of practice for information security professionals}, booktitle = {Proceedings of the 9th International Conference on Education Technology and Computers, {ICETC} 2017, Barcelona, Spain, December 20-22, 2017}, pages = {191--197}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3175536.3175562}, doi = {10.1145/3175536.3175562}, timestamp = {Tue, 06 Nov 2018 16:58:26 +0100}, biburl = {https://dblp.org/rec/conf/icetc/AgrawalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017-1, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6}, doi = {10.1007/978-3-319-66402-6}, isbn = {978-3-319-66401-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017-2, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9}, doi = {10.1007/978-3-319-66399-9}, isbn = {978-3-319-66398-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PandeyS16, author = {Pankaj Pandey and Einar Snekkenes}, title = {Using Financial Instruments to Transfer the Information Security Risks}, journal = {Future Internet}, volume = {8}, number = {2}, pages = {20}, year = {2016}, url = {https://doi.org/10.3390/fi8020020}, doi = {10.3390/FI8020020}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/PandeyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/AmanS15, author = {Waqas Aman and Einar Snekkenes}, title = {{EDAS:} An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things}, journal = {Future Internet}, volume = {7}, number = {3}, pages = {225--256}, year = {2015}, url = {https://doi.org/10.3390/fi7030225}, doi = {10.3390/FI7030225}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/AmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanS15, author = {Waqas Aman and Einar Snekkenes}, title = {Managing security trade-offs in the Internet of Things using adaptive security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {362--368}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412122}, doi = {10.1109/ICITST.2015.7412122}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PandeyS15, author = {Pankaj Pandey and Einar Arthur Snekkenes}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Design and Performance Aspects of Information Security Prediction Markets for Risk Management}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {273--284}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005547502730284}, doi = {10.5220/0005547502730284}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PandeyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/PandeyS14, author = {Pankaj Pandey and Einar Arthur Snekkenes}, title = {Applicability of Prediction Markets in Information Security Risk Management}, booktitle = {25th International Workshop on Database and Expert Systems Applications, {DEXA} 2014, Munich, Germany, September 1-5, 2014}, pages = {296--300}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DEXA.2014.66}, doi = {10.1109/DEXA.2014.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/PandeyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/WangenS14, author = {Gaute Wangen and Einar Arthur Snekkenes}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {A Comparison between Business Process Management and Information Security Management}, booktitle = {Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, September 7-10, 2014}, series = {Annals of Computer Science and Information Systems}, volume = {2}, pages = {901--910}, year = {2014}, url = {https://doi.org/10.15439/2014F77}, doi = {10.15439/2014F77}, timestamp = {Tue, 23 Apr 2024 09:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/WangenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PandeyS14, author = {Pankaj Pandey and Einar Arthur Snekkenes}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Using Prediction Markets to Hedge Information Security Risks}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {129--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_9}, doi = {10.1007/978-3-319-11851-2\_9}, timestamp = {Thu, 23 Sep 2021 11:47:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/PandeyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idman/Snekkenes13, author = {Einar Snekkenes}, editor = {Simone Fischer{-}H{\"{u}}bner and Elisabeth de Leeuw and Chris J. Mitchell}, title = {Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives}, booktitle = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6 Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {396}, pages = {100--103}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37282-7\_9}, doi = {10.1007/978-3-642-37282-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idman/Snekkenes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RajbhandariS13, author = {Lisa Rajbhandari and Einar Snekkenes}, editor = {Lech J. Janczewski and Henry B. Wolfe and Sujeet Shenoi}, title = {Using the Conflicting Incentives Risk Analysis Method}, booktitle = {Security and Privacy Protection in Information Processing Systems - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {405}, pages = {315--329}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39218-4\_24}, doi = {10.1007/978-3-642-39218-4\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/RajbhandariS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RajbhandariS13, author = {Lisa Rajbhandari and Einar Snekkenes}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {124--136}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_11}, doi = {10.1007/978-3-642-40343-9\_11}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/RajbhandariS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/DyrkolbotnWS12, author = {Geir Olav Dyrkolbotn and Knut Wold and Einar Snekkenes}, title = {Layout Dependent Phenomena {A} New Side-channel Power Model}, journal = {J. Comput.}, volume = {7}, number = {4}, pages = {827--837}, year = {2012}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=124\&\#38;id=2045}, doi = {10.4304/JCP.7.4.827-837}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/DyrkolbotnWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RajbhandariS12, author = {Lisa Rajbhandari and Einar Snekkenes}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Intended Actions: Risk Is Conflicting Incentives}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {370--386}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_23}, doi = {10.1007/978-3-642-33383-5\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/RajbhandariS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/GafurovBS11, author = {Davrondzhon Gafurov and Patrick Bours and Einar Snekkenes}, title = {User authentication based on foot motion}, journal = {Signal Image Video Process.}, volume = {5}, number = {4}, pages = {457--467}, year = {2011}, url = {https://doi.org/10.1007/s11760-011-0249-1}, doi = {10.1007/S11760-011-0249-1}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/GafurovBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RajbhandariS11, author = {Lisa Rajbhandari and Einar Snekkenes}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Mapping between Classical Risk Management and Game Theoretical Approaches}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {147--154}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_12}, doi = {10.1007/978-3-642-24712-5\_12}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/RajbhandariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/RajbhandariS11, author = {Lisa Rajbhandari and Einar Snekkenes}, title = {An approach to measure effectiveness of control for risk analysis with game theory}, booktitle = {1st Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2011, Milan, Italy, September 8, 2011}, pages = {24--29}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/STAST.2011.6059252}, doi = {10.1109/STAST.2011.6059252}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/stast/RajbhandariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/GafurovSB10, author = {Davrondzhon Gafurov and Einar Snekkenes and Patrick Bours}, title = {Improved Gait Recognition Performance Using Cycle Matching}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {836--841}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WAINA.2010.145}, doi = {10.1109/WAINA.2010.145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/GafurovSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DyrkolbotnWS10, author = {Geir Olav Dyrkolbotn and Knut Wold and Einar Snekkenes}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Security Implications of Crosstalk in Switching {CMOS} Gates}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {269--275}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_23}, doi = {10.1007/978-3-642-18178-8\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/DyrkolbotnWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/RajbhandariS10, author = {Lisa Rajbhandari and Einar Snekkenes}, editor = {Simone Fischer{-}H{\"{u}}bner and Penny Duquenoy and Marit Hansen and Ronald Leenes and Ge Zhang}, title = {Using Game Theory to Analyze Risk to Privacy: An Initial Insight}, booktitle = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {352}, pages = {41--51}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-20769-3\_4}, doi = {10.1007/978-3-642-20769-3\_4}, timestamp = {Fri, 05 Aug 2022 07:31:50 +0200}, biburl = {https://dblp.org/rec/conf/primelife/RajbhandariS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/GafurovS09, author = {Davrondzhon Gafurov and Einar Snekkenes}, title = {Gait Recognition Using Wearable Motion Recording Sensors}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/415817}, doi = {10.1155/2009/415817}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/GafurovS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/HelkalaS09, author = {Kirsi Helkala and Einar Snekkenes}, title = {Formalizing the ranking of authentication products}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {1}, pages = {30--43}, year = {2009}, url = {https://doi.org/10.1108/09685220910944740}, doi = {10.1108/09685220910944740}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/HelkalaS09, author = {Kirsi Helkala and Einar Snekkenes}, title = {Password Generation and Search Space Reduction}, journal = {J. Comput.}, volume = {4}, number = {7}, pages = {663--669}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=102\&\#38;id=1665}, doi = {10.4304/JCP.4.7.663-669}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcp/HelkalaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgr/GafurovS08, author = {Davrondzhon Gafurov and Einar Snekkenes}, title = {Towards understanding the uniqueness of gait biometric}, booktitle = {8th {IEEE} International Conference on Automatic Face and Gesture Recognition {(FG} 2008), Amsterdam, The Netherlands, 17-19 September 2008}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AFGR.2008.4813383}, doi = {10.1109/AFGR.2008.4813383}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgr/GafurovS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/AndreassenS08, author = {Freddy Andreassen and Einar Snekkenes}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Security and privacy awareness of home {PC} users in Norway}, booktitle = {2nd International Conference on Human Aspects of Information Security and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings}, pages = {56--68}, publisher = {University of Plymouth}, year = {2008}, url = {http://www.cscan.org/openaccess/?paperid=47}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/AndreassenS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/HelkalaS08, author = {Kirsi Helkala and Einar Snekkenes}, editor = {Nathan L. Clarke and Steven Furnell}, title = {A method for ranking authentication products}, booktitle = {2nd International Conference on Human Aspects of Information Security and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings}, pages = {80--93}, publisher = {University of Plymouth}, year = {2008}, url = {http://www.cscan.org/openaccess/?paperid=45}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/HelkalaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/GafurovS08, author = {Davrondzhon Gafurov and Einar Snekkenes}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Arm Swing as a Weak Biometric for Unobtrusive User Authentication}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1080--1087}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.47}, doi = {10.1109/IIH-MSP.2008.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/GafurovS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GafurovSB07, author = {Davrondzhon Gafurov and Einar Snekkenes and Patrick Bours}, title = {Spoof Attacks on Gait Authentication System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {2}, number = {3-2}, pages = {491--502}, year = {2007}, url = {https://doi.org/10.1109/TIFS.2007.902030}, doi = {10.1109/TIFS.2007.902030}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GafurovSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/autoid/GafurovSB07, author = {Davrondzhon Gafurov and Einar Snekkenes and Patrick Bours}, title = {Gait Authentication and Identification Using Wearable Accelerometer Sensor}, booktitle = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies, AutoID 2007, Alghero, Italy, June 7-8, 2007}, pages = {220--225}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/AUTOID.2007.380623}, doi = {10.1109/AUTOID.2007.380623}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/autoid/GafurovSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/KosmerljFHS06, author = {Marijana Kosmerlj and Tom Fladsrud and Erik Hjelm{\aa}s and Einar Snekkenes}, editor = {David Zhang and Anil K. Jain}, title = {Face Recognition Issues in a Border Control Environment}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2006, Hong Kong, China, January 5-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3832}, pages = {33--39}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11608288\_5}, doi = {10.1007/11608288\_5}, timestamp = {Thu, 17 Oct 2019 12:39:20 +0200}, biburl = {https://dblp.org/rec/conf/icb/KosmerljFHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DyrkolbotnS06, author = {Geir Olav Dyrkolbotn and Einar Snekkenes}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {A Wireless Covert Channel on Smart Cards (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {249--259}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_18}, doi = {10.1007/11935308\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/DyrkolbotnS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/GafurovSB06, author = {Davrondzhon Gafurov and Einar Snekkenes and Tor Erik Buvarp}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {Robustness of Biometric Gait Authentication Against Impersonation Attack}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {479--488}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_71}, doi = {10.1007/11915034\_71}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/GafurovSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Snekkenes05, author = {Einar Snekkenes}, title = {Preface to the special issue on {ESORICS} 2003}, journal = {Int. J. Inf. Sec.}, volume = {4}, number = {3}, pages = {133--134}, year = {2005}, url = {https://doi.org/10.1007/s10207-004-0054-8}, doi = {10.1007/S10207-004-0054-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Snekkenes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HasleKKS05, author = {H{\aa}gen Hasle and Yngve Kristiansen and Ketil Kintel and Einar Snekkenes}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Measuring Resistance to Social Engineering}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {132--143}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_12}, doi = {10.1007/978-3-540-31979-5\_12}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HasleKKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/LangwegS04, author = {Hanno Langweg and Einar Snekkenes}, title = {A classification of malicious software attacks}, booktitle = {Proceedings of the 23rd {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix, Arizona, {USA}}, pages = {827--832}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/PCCC.2004.1395194}, doi = {10.1109/PCCC.2004.1395194}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/LangwegS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2003, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13237}, doi = {10.1007/B13237}, isbn = {3-540-20300-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/Snekkenes01, author = {Einar Snekkenes}, editor = {Michael P. Wellman and Yoav Shoham}, title = {Concepts for personal location privacy policies}, booktitle = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001}, pages = {48--57}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501158.501164}, doi = {10.1145/501158.501164}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/Snekkenes01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Snekkenes92, author = {Einar Snekkenes}, title = {Roles in cryptographic protocols}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {105--119}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213267}, doi = {10.1109/RISP.1992.213267}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/Snekkenes92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GaarderS91, author = {Klaus Gaarder and Einar Snekkenes}, title = {Applying a Formal Analysis Technique to the {CCITT} {X.509} Strong Two-Way Authentication Protocol}, journal = {J. Cryptol.}, volume = {3}, number = {2}, pages = {81--98}, year = {1991}, url = {https://doi.org/10.1007/BF00196790}, doi = {10.1007/BF00196790}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GaarderS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Snekkenes91, author = {Einar Snekkenes}, title = {Exploring the {BAN} Approach to Protocol Analysis}, booktitle = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 20-22, 1991}, pages = {171--181}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/RISP.1991.130785}, doi = {10.1109/RISP.1991.130785}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/Snekkenes91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GaarderS90, author = {Klaus Gaarder and Einar Snekkenes}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {On The Formal Analysis of {PKCS} Authentication Protocols}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {106--121}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030355}, doi = {10.1007/BFB0030355}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GaarderS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pstv/Snekkenes90, author = {Einar Snekkenes}, editor = {Luigi Logrippo and Robert L. Probert and Hasan Ural}, title = {Authentication in Open Systems}, booktitle = {Protocol Specification, Testing and Verification X, Proceedings of the {IFIP} {WG6.1} Tenth International Symposium on Protocol Specification, Testing and Verification, Ottawa, Ontario, Canada, 12-15 June, 1990}, pages = {311--324}, publisher = {North-Holland}, year = {1990}, timestamp = {Thu, 03 Jan 2002 12:07:46 +0100}, biburl = {https://dblp.org/rec/conf/pstv/Snekkenes90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.