2021
|
1. |
Hole, Kjell Jørgen. Tutorial on systems with antifragility to downtime. Computing 2021 s. -
Untitled
|
|
2. |
Hole, Kjell Jørgen; Ahmad, Subutai. A thousand brains: toward biologically constrained AI. SN Applied Sciences 2021 ;Volum 3.(8) s. -
Untitled
|
2019
|
3. |
Hole, Kjell Jørgen. Dominating Software Systems: How to Overcome Online Information Asymmetry. IEEE Software 2019 ;Volum 36.(4) s. 81-87 UiB
Untitled
|
|
4. |
Hole, Kjell Jørgen; Ahmad, Subutai. Biologically Driven Artificial Intelligence. Computer 2019 ;Volum 52.(8) s. 72-75
Untitled
|
2017
|
5. |
Otterstad, Christian W.. Selected x86 Low-level Attacks and Mitigations. : Universitetet i Bergen 2017 (ISBN 978-82-308-3944-7) UiB
Untitled
|
2016
|
6. |
Hole, Kjell Jørgen. Anti-fragile ICT Systems. Springer 2016 (ISBN 978-3-319-30068-9) 151 s. UiB
Untitled
|
|
7. |
Hole, Kjell Jørgen. Building Trust in E-Government Services. Computer 2016 ;Volum 49.(1) s. 66-74 UiB
Untitled
|
|
8. |
Lysne, Olav; Hole, Kjell Jørgen; Otterstad, Christian W.; Ytrehus, Øyvind; Aarseth, Raymond; Tellnes, Jørgen. Vendor malware: detection limits and mitigation. Computer 2016 ;Volum 49.(8) s. 62-69 UiB
Untitled
|
2015
|
9. |
Hole, Kjell Jørgen. Diversity reduces the impact of malware. IEEE Security and Privacy 2015 ;Volum 13.(3) s. 48-54 UiB
Untitled
|
|
10. |
Hole, Kjell Jørgen. Toward anti-fragility: a malware-halting technique. IEEE Security and Privacy 2015 ;Volum 13.(4) s. 40-46 UiB
Untitled
|
|
11. |
Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen. Channel prediction for adaptive coded modulation in Rayleigh fading. European Signal Processing Conference 2015 ;Volum 2015-March:7071885. NTNU
Untitled
|
2013
|
12. |
Hole, Kjell Jørgen. Management of hidden risks. Computer 2013 ;Volum 46.(1) s. 65-70 UiB
Untitled
|
2012
|
13. |
Hole, Kjell Jørgen. Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks. Journal of Computer Networks and Communications 2012 ;Volum 2012. s. - UiB
Untitled
|
|
14. |
Nestås, Lars Hopland; Hole, Kjell Jørgen. Building and maintaining trust in Internet voting. Computer 2012 ;Volum 45.(5) s. 74-80 UiB
Untitled
|
2011
|
15. |
Hole, Kjell Jørgen. Banksikkerheten er fortsatt for dårlig. NRK [Internett] 2011-02-16 UiB
Untitled
|
|
16. |
Hole, Kjell Jørgen. Mener risikoanalyse ikke duger. Computerworld [Internett] 2011-09-23 UiB
Untitled
|
|
17. |
Hole, Kjell Jørgen. Systemene vil svikte. Dagens næringsliv 2011 UiB
Untitled
|
|
18. |
Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. Farene ved e-valg. Dagbladet 2011 UiB NTNU
Untitled
|
2010
|
19. |
Hole, Kjell Jørgen; Netland, Lars-Helge. Toward risk assessment of large-impact and rare events. IEEE Security and Privacy 2010 ;Volum 8.(3) s. 21-27 UiB
Untitled
|
|
20. |
Nestås, Lars Hopland; Raddum, Håvard; Hole, Kjell Jørgen. Valg på nett er mulig. Aftenposten (morgenutg. : trykt utg.) 2010 UiB
Untitled
|
|
21. |
Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen. Security Analysis of Mobile Phones Used as OTP Generators. I: Information Security Theory and Practices, WISTP 2010. Springer 2010 ISBN 3-642-12367-8. s. 324-331 UiB
Untitled
|
2009
|
22. |
Hole, Kjell Jørgen; Klingsheim, Andre Nysæther; Netland, Lars-Helge; Espelid, Yngve; Tjøstheim, Thomas; Moen, Vebjørn. Risk Assessment of a National Security Infrastructure. IEEE Security and Privacy 2009 ;Volum 7.(1) s. 34-41 UiB
Untitled
|
|
23. |
Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen. Når folket stemmer hjemme. Hubro. Magasin for Universitetet i Bergen 2009 (4) s. 24-25 UiB
Untitled
|
2008
|
24. |
Espelid, Yngve; Netland, Lars-Helge; Klingsheim, Andre Nysæther; Hole, Kjell Jørgen. A Proof of Concept Attack against Norwegian Internet Banking Systems. I: Proceedings 12th International Conference on Financial Cryptography and Data Security. Springer 2008 ISBN 978-3-540-85229-2. s. 197-201 UiB
Untitled
|
|
25. |
Espelid, Yngve; Netland, Lars-Helge; Klingsheim, Andre Nysæther; Hole, Kjell Jørgen. Robbing Banks with Their Own Software—an Exploit against Norwegian Online Banks. I: Proceedings of The Ifip Tc 11 23rd International Information Security Conference. Springer Science+Business Media B.V. 2008 ISBN 978-0-387-09698-8. s. 63-77 UiB
Untitled
|
|
26. |
Gjendemsjø, Anders; Øien, Geir Egil; Holm, Henrik; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen; Orten, Pål. Rate and power allocation for discrete-rate link adaptation. EURASIP Journal on Wireless Communications and Networking 2008 s. - UiB NTNU UiO
Untitled
|
|
27. |
Hole, Kjell Jørgen; Netland, Lars-Helge; Espelid, Yngve; Klingsheim, Andre Nysæther; Helleseth, Hallvar; Henriksen, Jan Berger. Open wireless networks on university campuses. IEEE Security and Privacy 2008 ;Volum 6.(4) s. 14-20 UiB
Untitled
|
|
28. |
Klingsheim, Andre Nysæther; Hole, Kjell Jørgen. Identity Theft: Much too Easy? A study of Online Systems in Norway. I: Proceedings 12th International Conference on Financial Cryptography and Data Security. Springer 2008 ISBN 978-3-540-85229-2. s. 192-196 UiB
Untitled
|
2007
|
29. |
Gjøsteen, Kristian; Hole, Kjell Jørgen. Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007 NTNU UiB
Untitled
|
|
30. |
Hole, Kjell Jørgen; Klingsheim, Andre Nysæther; Netland, Lars-Helge; Espelid, Yngve; Holen, Ida. Identiteter på avveie. Bergens Tidende 2007 UiB
Untitled
|
|
31. |
Hole, Kjell Jørgen; Moen, Vebjørn; Klingsheim, Andre Nysæther; Tande, Knut Martin. Lessons from the Norwegian ATM system. IEEE Security and Privacy 2007 ;Volum 5.(6) s. 25-31 UiB
Untitled
|
|
32. |
Klingsheim, Andre Nysæther; Moen, Vebjørn; Hole, Kjell Jørgen. Challenges in securing networked J2ME applications. Computer 2007 ;Volum 40.(2) s. 24-30 UiB
Untitled
|
|
33. |
Moen, Vebjørn; Klingsheim, Andre Nysæther; Simonsen, Kent Inge Fagerland; Hole, Kjell Jørgen. Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics 2007 ;Volum 1.(1) s. 89-100 UiB
Untitled
|
2006
|
34. |
Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen. Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. IEEE Transactions on Vehicular Technology 2006 ;Volum 55.(2) s. 458-465 UiB NTNU
Untitled
|
|
35. |
Espelid, Yngve; Netland, Lars-Helge; Mughal, Khalid Azim; Hole, Kjell Jørgen. Simplifying Client-Server Application Development with Secure Reusable Components. International Symposium on Secure Software Engineering; 2006-03-13 - 2006-03-15 UiB
Untitled
|
|
36. |
Hole, Kjell Jørgen; Moen, Vebjørn; Tjøstheim, Thomas. Case study: Online banking security. IEEE Security and Privacy 2006 ;Volum 4.(2) s. 14-20 UiB
Untitled
|
|
37. |
Moen, Vebjørn; Klingsheim, Andre Nysæther; Simonsen, Kent Inge Fagerland; Hole, Kjell Jørgen. Vulnerabilities in E-Governments. The Annual International Conference on Global e-Security; 2006-04-20 - 2006-04-22 UiB
Untitled
|
2005
|
38. |
Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen. Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. COST 273; 2005-01-19 - 2005-01-21 NTNU
Untitled
|
|
39. |
Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen. Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. : European Signal Processing Conference 2005 (ISBN 975-00188-0-X) 4 s. NTNU
Untitled
|
|
40. |
Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen. Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. European Signal Processing Conference; 2005-09-04 - 2005-09-08 NTNU
Untitled
|
|
41. |
Moen, Vebjørn; Hole, Kjell Jørgen; Simonsen, Kent Inge Fagerland. Attack on Sun's MIDP Reference Implementation of SSL. Nordsec 2005; 2005-10-20 - 2005-10-21 UiB
Untitled
|
|
42. |
Hole, Kjell Jørgen; Dyrnes, E; Thorsheim, P. Securing Wi-Fi networks. Computer 2005 ;Volum 38.(7) s. 28-34 UiB
Untitled
|
2004
|
43. |
Jetlund, Ola; Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen. Spectral efficiency bounds for adaptive coded modulation with outage probability constraints and imperfect channel prediction. Nordic Radio Symposium 2004; 2004-08-18 NTNU
Untitled
|
|
44. |
Moen, Vebjørn; Raddum, Håvard; Hole, Kjell Jørgen. Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review 2004 ;Volum 8.(2) s. 76-83 UiB
Untitled
|
|
45. |
Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen. Impact of channel prediction on adaptive coded modulation performance in Rayleigh fading. IEEE Transactions on Vehicular Technology 2004 ;Volum 53. s. 758-769 NTNU UiB
Untitled
|
2003
|
46. |
Bøhagen, Frode; Øien, Geir Egil; Alouini, Mohamed-Slim; Hole, Kjell Jørgen. Bounds on average area spectral efficiency for adaptive coded modulation in cellular networks. 6th Baiona Workshop on Signal Processing in Communications; 2003-09-10 NTNU
Untitled
|
|
47. |
Holm, Henrik; Øien, Geir Egil; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen. Optimal Design of Adaptive Coded Modulation Schemes for Maximum Average Spectral Efficiency. Signal Processing Advances in Wireless Communications (SPAWC) 2003; 2003-06-18 NTNU UiO
Untitled
|
|
48. |
Holter, Bengt; Øien, Geir Egil; Hole, Kjell Jørgen; Holm, Henrik. Limitations in Spectral Efficiency of a Rate-Adaptive MIMO System Utilizing Pilot-Aided Channel Prediction. IEEE Vehicular Technology Conference; 2003-04-25 NTNU
Untitled
|
|
49. |
Jetlund, Ola; Øien, Geir Egil; Hole, Kjell Jørgen. Adaptive Gallager Coded Modulation on Rayleigh Fading Channels: Comparison of Simulated and Theoretical Performance. COoperation européenne dans le domaine de la recherche Scientifique et Technique - 273 (02); 2002-01-17 NTNU
Untitled
|
|
50. |
Jetlund, Ola; Øien, Geir Egil; Hole, Kjell Jørgen; Holter, Bengt. Adaptive Gallager coded modulation scheme on Rayleigh fading channels: Comparison of simulated and theoretical performance. Norwegian Signal Processing Symposium; 2003-10-04 NTNU
Untitled
|