Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 194 << Forrige 1 2 3 4    Neste >>

2021
1 Hole, Kjell Jørgen.
Tutorial on systems with antifragility to downtime. Computing 2021 s. -
Untitled
 
2 Hole, Kjell Jørgen; Ahmad, Subutai.
A thousand brains: toward biologically constrained AI. SN Applied Sciences 2021 ;Volum 3.(8) s. -
Untitled
 
2019
3 Hole, Kjell Jørgen.
Dominating Software Systems: How to Overcome Online Information Asymmetry. IEEE Software 2019 ;Volum 36.(4) s. 81-87
UiB Untitled
 
4 Hole, Kjell Jørgen; Ahmad, Subutai.
Biologically Driven Artificial Intelligence. Computer 2019 ;Volum 52.(8) s. 72-75
Untitled
 
2017
5 Otterstad, Christian W..
Selected x86 Low-level Attacks and Mitigations. : Universitetet i Bergen 2017 (ISBN 978-82-308-3944-7)
UiB Untitled
 
2016
6 Hole, Kjell Jørgen.
Anti-fragile ICT Systems. Springer 2016 (ISBN 978-3-319-30068-9) 151 s.
UiB Untitled
 
7 Hole, Kjell Jørgen.
Building Trust in E-Government Services. Computer 2016 ;Volum 49.(1) s. 66-74
UiB Untitled
 
8 Lysne, Olav; Hole, Kjell Jørgen; Otterstad, Christian W.; Ytrehus, Øyvind; Aarseth, Raymond; Tellnes, Jørgen.
Vendor malware: detection limits and mitigation. Computer 2016 ;Volum 49.(8) s. 62-69
UiB Untitled
 
2015
9 Hole, Kjell Jørgen.
Diversity reduces the impact of malware. IEEE Security and Privacy 2015 ;Volum 13.(3) s. 48-54
UiB Untitled
 
10 Hole, Kjell Jørgen.
Toward anti-fragility: a malware-halting technique. IEEE Security and Privacy 2015 ;Volum 13.(4) s. 40-46
UiB Untitled
 
11 Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen.
Channel prediction for adaptive coded modulation in Rayleigh fading. European Signal Processing Conference 2015 ;Volum 2015-March:7071885.
NTNU Untitled
 
2013
12 Hole, Kjell Jørgen.
Management of hidden risks. Computer 2013 ;Volum 46.(1) s. 65-70
UiB Untitled
 
2012
13 Hole, Kjell Jørgen.
Toward a Practical Technique to Halt Multiple Virus Outbreaks on Computer Networks. Journal of Computer Networks and Communications 2012 ;Volum 2012. s. -
UiB Untitled
 
14 Nestås, Lars Hopland; Hole, Kjell Jørgen.
Building and maintaining trust in Internet voting. Computer 2012 ;Volum 45.(5) s. 74-80
UiB Untitled
 
2011
15 Hole, Kjell Jørgen.
Banksikkerheten er fortsatt for dårlig. NRK [Internett] 2011-02-16
UiB Untitled
 
16 Hole, Kjell Jørgen.
Mener risikoanalyse ikke duger. Computerworld [Internett] 2011-09-23
UiB Untitled
 
17 Hole, Kjell Jørgen.
Systemene vil svikte. Dagens næringsliv 2011
UiB Untitled
 
18 Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland.
Farene ved e-valg. Dagbladet 2011
UiB NTNU Untitled
 
2010
19 Hole, Kjell Jørgen; Netland, Lars-Helge.
Toward risk assessment of large-impact and rare events. IEEE Security and Privacy 2010 ;Volum 8.(3) s. 21-27
UiB Untitled
 
20 Nestås, Lars Hopland; Raddum, Håvard; Hole, Kjell Jørgen.
Valg på nett er mulig. Aftenposten (morgenutg. : trykt utg.) 2010
UiB Untitled
 
21 Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen.
Security Analysis of Mobile Phones Used as OTP Generators. I: Information Security Theory and Practices, WISTP 2010. Springer 2010 ISBN 3-642-12367-8. s. 324-331
UiB Untitled
 
2009
22 Hole, Kjell Jørgen; Klingsheim, Andre Nysæther; Netland, Lars-Helge; Espelid, Yngve; Tjøstheim, Thomas; Moen, Vebjørn.
Risk Assessment of a National Security Infrastructure. IEEE Security and Privacy 2009 ;Volum 7.(1) s. 34-41
UiB Untitled
 
23 Raddum, Håvard; Nestås, Lars Hopland; Hole, Kjell Jørgen.
Når folket stemmer hjemme. Hubro. Magasin for Universitetet i Bergen 2009 (4) s. 24-25
UiB Untitled
 
2008
24 Espelid, Yngve; Netland, Lars-Helge; Klingsheim, Andre Nysæther; Hole, Kjell Jørgen.
A Proof of Concept Attack against Norwegian Internet Banking Systems. I: Proceedings 12th International Conference on Financial Cryptography and Data Security. Springer 2008 ISBN 978-3-540-85229-2. s. 197-201
UiB Untitled
 
25 Espelid, Yngve; Netland, Lars-Helge; Klingsheim, Andre Nysæther; Hole, Kjell Jørgen.
Robbing Banks with Their Own Software—an Exploit against Norwegian Online Banks. I: Proceedings of The Ifip Tc 11 23rd International Information Security Conference. Springer Science+Business Media B.V. 2008 ISBN 978-0-387-09698-8. s. 63-77
UiB Untitled
 
26 Gjendemsjø, Anders; Øien, Geir Egil; Holm, Henrik; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen; Orten, Pål.
Rate and power allocation for discrete-rate link adaptation. EURASIP Journal on Wireless Communications and Networking 2008 s. -
UiB NTNU UiO Untitled
 
27 Hole, Kjell Jørgen; Netland, Lars-Helge; Espelid, Yngve; Klingsheim, Andre Nysæther; Helleseth, Hallvar; Henriksen, Jan Berger.
Open wireless networks on university campuses. IEEE Security and Privacy 2008 ;Volum 6.(4) s. 14-20
UiB Untitled
 
28 Klingsheim, Andre Nysæther; Hole, Kjell Jørgen.
Identity Theft: Much too Easy? A study of Online Systems in Norway. I: Proceedings 12th International Conference on Financial Cryptography and Data Security. Springer 2008 ISBN 978-3-540-85229-2. s. 192-196
UiB Untitled
 
2007
29 Gjøsteen, Kristian; Hole, Kjell Jørgen.
Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007
NTNU UiB Untitled
 
30 Hole, Kjell Jørgen; Klingsheim, Andre Nysæther; Netland, Lars-Helge; Espelid, Yngve; Holen, Ida.
Identiteter på avveie. Bergens Tidende 2007
UiB Untitled
 
31 Hole, Kjell Jørgen; Moen, Vebjørn; Klingsheim, Andre Nysæther; Tande, Knut Martin.
Lessons from the Norwegian ATM system. IEEE Security and Privacy 2007 ;Volum 5.(6) s. 25-31
UiB Untitled
 
32 Klingsheim, Andre Nysæther; Moen, Vebjørn; Hole, Kjell Jørgen.
Challenges in securing networked J2ME applications. Computer 2007 ;Volum 40.(2) s. 24-30
UiB Untitled
 
33 Moen, Vebjørn; Klingsheim, Andre Nysæther; Simonsen, Kent Inge Fagerland; Hole, Kjell Jørgen.
Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics 2007 ;Volum 1.(1) s. 89-100
UiB Untitled
 
2006
34 Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen.
Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. IEEE Transactions on Vehicular Technology 2006 ;Volum 55.(2) s. 458-465
UiB NTNU Untitled
 
35 Espelid, Yngve; Netland, Lars-Helge; Mughal, Khalid Azim; Hole, Kjell Jørgen.
Simplifying Client-Server Application Development with Secure Reusable Components. International Symposium on Secure Software Engineering; 2006-03-13 - 2006-03-15
UiB Untitled
 
36 Hole, Kjell Jørgen; Moen, Vebjørn; Tjøstheim, Thomas.
Case study: Online banking security. IEEE Security and Privacy 2006 ;Volum 4.(2) s. 14-20
UiB Untitled
 
37 Moen, Vebjørn; Klingsheim, Andre Nysæther; Simonsen, Kent Inge Fagerland; Hole, Kjell Jørgen.
Vulnerabilities in E-Governments. The Annual International Conference on Global e-Security; 2006-04-20 - 2006-04-22
UiB Untitled
 
2005
38 Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen.
Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. COST 273; 2005-01-19 - 2005-01-21
NTNU Untitled
 
39 Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen.
Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. : European Signal Processing Conference 2005 (ISBN 975-00188-0-X) 4 s.
NTNU Untitled
 
40 Duong, Duc Van; Øien, Geir Egil; Hole, Kjell Jørgen.
Adaptive coded modulation with receive antenna diversity and imperfect channel knowledge at receiver and transmitter. European Signal Processing Conference; 2005-09-04 - 2005-09-08
NTNU Untitled
 
41 Moen, Vebjørn; Hole, Kjell Jørgen; Simonsen, Kent Inge Fagerland.
Attack on Sun's MIDP Reference Implementation of SSL. Nordsec 2005; 2005-10-20 - 2005-10-21
UiB Untitled
 
42 Hole, Kjell Jørgen; Dyrnes, E; Thorsheim, P.
Securing Wi-Fi networks. Computer 2005 ;Volum 38.(7) s. 28-34
UiB Untitled
 
2004
43 Jetlund, Ola; Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen.
Spectral efficiency bounds for adaptive coded modulation with outage probability constraints and imperfect channel prediction. Nordic Radio Symposium 2004; 2004-08-18
NTNU Untitled
 
44 Moen, Vebjørn; Raddum, Håvard; Hole, Kjell Jørgen.
Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review 2004 ;Volum 8.(2) s. 76-83
UiB Untitled
 
45 Øien, Geir Egil; Holm, Henrik; Hole, Kjell Jørgen.
Impact of channel prediction on adaptive coded modulation performance in Rayleigh fading. IEEE Transactions on Vehicular Technology 2004 ;Volum 53. s. 758-769
NTNU UiB Untitled
 
2003
46 Bøhagen, Frode; Øien, Geir Egil; Alouini, Mohamed-Slim; Hole, Kjell Jørgen.
Bounds on average area spectral efficiency for adaptive coded modulation in cellular networks. 6th Baiona Workshop on Signal Processing in Communications; 2003-09-10
NTNU Untitled
 
47 Holm, Henrik; Øien, Geir Egil; Alouini, Mohamed-Slim; Gesbert, David; Hole, Kjell Jørgen.
Optimal Design of Adaptive Coded Modulation Schemes for Maximum Average Spectral Efficiency. Signal Processing Advances in Wireless Communications (SPAWC) 2003; 2003-06-18
NTNU UiO Untitled
 
48 Holter, Bengt; Øien, Geir Egil; Hole, Kjell Jørgen; Holm, Henrik.
Limitations in Spectral Efficiency of a Rate-Adaptive MIMO System Utilizing Pilot-Aided Channel Prediction. IEEE Vehicular Technology Conference; 2003-04-25
NTNU Untitled
 
49 Jetlund, Ola; Øien, Geir Egil; Hole, Kjell Jørgen.
Adaptive Gallager Coded Modulation on Rayleigh Fading Channels: Comparison of Simulated and Theoretical Performance. COoperation européenne dans le domaine de la recherche Scientifique et Technique - 273 (02); 2002-01-17
NTNU Untitled
 
50 Jetlund, Ola; Øien, Geir Egil; Hole, Kjell Jørgen; Holter, Bengt.
Adaptive Gallager coded modulation scheme on Rayleigh fading channels: Comparison of simulated and theoretical performance. Norwegian Signal Processing Symposium; 2003-10-04
NTNU Untitled
 
    Vis neste liste