Navigasjon

  • Hopp til innhold
NTNU Hjemmeside

ntnu.no

  • Studier
    • Studieprogram
    • Søk opptak
    • Forkurs og oppfriskning
    • Videreutdanning og deltid
    • Studere på NTNU
  • Studentliv
    • Student i Gjøvik
    • Student i Trondheim
    • Student i Ålesund
    • Derfor velger vi NTNU
  • Forskning og innovasjon
    • Forskning
    • Innovasjon
    • Satsingsområder
    • Toppforskning
    • Ekspertlister
    • Ph.d.
  • Om NTNU
    • Fakulteter og institutter
    • Sentre
    • Bibliotek
    • Kart
    • Ledige stillinger
    • Arrangement
    • Nyheter
    • Kontakt oss
    • Om NTNU
  1. Hjem
  2. Ansatte

Språkvelger

English

Stephen Dirk Bjørn Wolthusen

Stephen Dirk Bjørn Wolthusen

Professor
Institutt for informasjonssikkerhet og kommunikasjonsteknologi

stephen.wolthusen@ntnu.no
61135289 Ametyst-bygget, Gjøvik
Om Publikasjoner Undervisning

Om

Kompetanseord

  • Sikkerhet og sårbarhet

Publikasjoner

  • Kronologisk
  • Etter kategori
  • Se alle publikasjoner i Cristin

2022

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection. volum 36.
    Errata

2021

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection. volum 35.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems. volum 254.
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA). volum 12 (3).
    Vitenskapelig artikkel

2020

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (2).
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. 2020 IEEE Conference on Communications and Network Security (CNS).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. 2020 International Conference on Computing, Networking and Communications (ICNC).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (2).
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (11).
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (11).
    Vitenskapelig oversiktsartikkel/review

2019

  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS). volum 11260 LNCS.
    Vitenskapelig artikkel
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet. volum 11 (10).
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK). volum 12.
    Vitenskapelig artikkel

2018

  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS). volum 10707 LNCS.
    Vitenskapelig artikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting.
    Vitenskapelig artikkel
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS). volum 10898 LNCS.
    Vitenskapelig artikkel
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology. volum 542.
    Vitenskapelig artikkel

2017

  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid. volum 8 (5).
    Vitenskapelig artikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications. volum 35.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing. volum 461.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing. volum 611.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS). volum 10446 LNCS.
    Vitenskapelig artikkel
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications.
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS). volum 10242 LNCS.
    Vitenskapelig artikkel
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. 2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS). volum 10166 LNCS.
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS). volum 10242 LNCS.
    Vitenskapelig artikkel

2016

  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS). volum 9572.
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications. volum 59.
    Vitenskapelig artikkel
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications. volum 2016-February.
    Vitenskapelig artikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS). volum 9578.
    Vitenskapelig artikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science. volum 670.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil; Sliwa, Joanna. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK). volum 2016.
    Vitenskapelig artikkel
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS). volum 9578.
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2015

  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. 2015 IEEE Innovative Smart Grid Technologies - Asia Conference Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK).
    Vitenskapelig artikkel
  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. Military Communications Conference, MILCOM 2015; October 26-28, 2015 Tampa, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. 2015 Global Information Infrastructure and Networking Symposium (GIIS 2015) Guadalajara, Mexico 28 – 30 October 2015 - Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2014

  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. Information Security in Diverse Computing Environments.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE Eighth International Symposium on Service Oriented System Engineering, SOSE 2014; 7–11 April 2014 Oxford, United Kingdom.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 14; April 08 - 10, 2014, Oak Ridge, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. The Fifth Conference on Innovative Smart Grid Technologies, ISGT 2014; February 19-22, 2014, Washington Grand Hyatt, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2013

  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. 2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Network and System Security, 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. Proceedings of IEEE Third International Conference on Cloud and Green Computing (CGC 2013) and IEEE Third International Conference on Social Computing and Its Applications (SCA 2013); 30 September – 2 October 2013, Karlsruhe, Germany.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer. 2013. ISBN 978-3-642-41476-3. Lecture Notes in Computer Science (6983).
    Vitenskapelig antologi/Konferanseserie
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. e-Energy’13, Proceedings of the fourth international conference on Future energy systems.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Information Assurance and Security Education and Training.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures. volum 9 (1/2).
    Vitenskapelig artikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. Proceedings of the IEEE 2nd International Network Science Workshop (NSW); West Point, NY, USA, April 29 2013-May 1 2013.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. 2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2012

  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems. volum 9 (3/4).
    Vitenskapelig artikkel
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer. 2012. ISBN 9783642289194. Lecture Notes in Computer Science (7130).
    Vitenskapelig antologi/Konferanseserie
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012; 20-24 August 2012; Prague, Czech Republic.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2011

  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Forensics in telecommunications, information, and multimedia : third international ICST conference, e-forensics 2010, Shanghai, China, November 11-12, 2010, revised selected papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. 5th International Conference on Network and System Security; Milan, Italy, September 6-8, 2011.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. 2011 IEEE, Network Science Workshop (NSW).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. 2011 IEEE, Network Science Workshop (NSW).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer. 2011. ISBN 978-3-642-21693-0. Lecture Notes in Computer Science (6712).
    Vitenskapelig antologi/Konferanseserie

2010

  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Digital Forensics and Cyber Crime.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Security and Privacy in Mobile Information and Communication Systems.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Advances in Digital Forensics VI.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Communications and Multimedia Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. 2010, Information Security for South Africa (ISSA), Proceedings of the ISSA 2010 Conference.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. Proceedings of the Fifth International Conference on Avaliability, Reliability and Security: ARES 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Critical Infrastructure Protection IV.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Critical Infrastructure Protection IV.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Information Security, Practice and Experience.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Critical Information Infrastructures Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. 2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2009

  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Advances in Biometrics.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. Proceedings of the Military Communications Conference, MILCOM 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. Proceedings of the Military Communications Conference, MILCOM 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Critical Infrastructure Protection II.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Image Analysis and Recognition.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Tidsskriftspublikasjoner

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2022) Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus (International Journal of Critical Infrastructure Protection (2021) 35, (S1874548221000536), (10.1016/j.ijcip.2021.100466)). International Journal of Critical Infrastructure Protection. volum 36.
    Errata
  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn. (2021) Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus. International Journal of Critical Infrastructure Protection. volum 35.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2021) A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda. Lecture Notes in Networks and Systems. volum 254.
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2021) Adopting Vulnerability Principle as the Panacea for Security Policy Monitoring. International Journal of Advanced Computer Science and Applications (IJACSA). volum 12 (3).
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) A Review of Asset-Centric Threat Modelling Approaches. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (2).
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Ethical Implications of Security Vulnerability Research for Critical Infrastructure Protection. Wirtschaftsinformatik.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. International Conference on Cyber Conflict, CYCON.
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian. (2020) Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (2).
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Comparative Analysis of Threat Modeling Methods for Cloud Computing towards Healthcare Security Practice. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (11).
    Vitenskapelig artikkel
  • Yeng, Prosper; Wolthusen, Stephen Dirk Bjørn; Yang, Bian. (2020) Legal requirements toward enhancing the security of medical devices. International Journal of Advanced Computer Science and Applications (IJACSA). volum 11 (11).
    Vitenskapelig oversiktsartikkel/review
  • Gul, Ammara; Wolthusen, Stephen. (2019) In-cycle sequential topology faults and attacks: Effects on state estimation. Lecture Notes in Computer Science (LNCS). volum 11260 LNCS.
    Vitenskapelig artikkel
  • Kavallieratos, Georgios; Chowdhury, Nabin; Katsikas, Sokratis; Gkioulos, Vasileios; Wolthusen, Stephen. (2019) Threat Analysis for Smart Homes. Future Internet. volum 11 (10).
    Vitenskapelig artikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen; Mancini, Luigi V.. (2019) A Framework for the Validation of Network Artifacts. Norsk Informasjonssikkerhetskonferanse (NISK). volum 12.
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2018) De-synchronisation attack modelling in real-time protocols using queue networks: Attacking the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS). volum 10707 LNCS.
    Vitenskapelig artikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2018) Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol. IEEE Power & Energy Society General Meeting.
    Vitenskapelig artikkel
  • Darwish, Salaheddin; Nouretdinov, Ilia; Wolthusen, Stephen. (2018) A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements. Lecture Notes in Computer Science (LNCS). volum 10898 LNCS.
    Vitenskapelig artikkel
  • Gul, Ammara; Wolthusen, Stephen. (2018) Error propagation after reordering attacks on hierarchical state estimation. IFIP Advances in Information and Communication Technology. volum 542.
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopez, Javier; Wolthusen, Stephen. (2017) OCPP Protocol: Security Threats and Challenges. IEEE Transactions on Smart Grid. volum 8 (5).
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Risthein, Erko; Wolthusen, Stephen. (2017) TACTICS: Validation of the security framework developed for tactical SOA. Journal of Information Security and Applications. volum 35.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures. Advances in Intelligent Systems and Computing. volum 461.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017. Advances in Intelligent Systems and Computing. volum 611.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) Security Requirements for the Deployment of Services Across Tactical SOA. Lecture Notes in Computer Science (LNCS). volum 10446 LNCS.
    Vitenskapelig artikkel
  • Kayem, Anne V.D.M.; Meinel, Christoph; Wolthusen, Stephen. (2017) A smart micro-grid architecture for resource constrained environments. Advanced Information Networking and Applications.
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Power auctioning in resource constrained micro-grids: Cases of cheating. Lecture Notes in Computer Science (LNCS). volum 10242 LNCS.
    Vitenskapelig artikkel
  • Weldehawaryat, Goitom Kahsay; Ambassa, Pacome L.; Marufu, Anesu M.C.; Wolthusen, Stephen; Kayem, Anne V.D.M.. (2017) Decentralised scheduling of power consumption in micro-grids: Optimisation and security. Lecture Notes in Computer Science (LNCS). volum 10166 LNCS.
    Vitenskapelig artikkel
  • Wright, James G; Wolthusen, Stephen. (2017) Access control and availability vulnerabilities in the ISO/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (LNCS). volum 10242 LNCS.
    Vitenskapelig artikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2016) MPLS Policy Target Recognition Network. Lecture Notes in Computer Science (LNCS). volum 9572.
    Vitenskapelig artikkel
  • Alcaraz, Cristina; Lopeza, Javier; Wolthusen, Stephen. (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Journal of Network and Computer Applications. volum 59.
    Vitenskapelig artikkel
  • Almulla, Sameera; Iraqi, Youssef; Wolthusen, Stephen. (2016) Inferring relevance and presence of evidence in service-oriented and SaaS architectures. Proceedings of the IEEE Symposium on Computers and Communications. volum 2016-February.
    Vitenskapelig artikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs in the Presence of Compromised Nodes. Lecture Notes in Computer Science (LNCS). volum 9578.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2016) Efficient security policy reconciliation in tactical service oriented architectures. Communications in Computer and Information Science. volum 670.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Iossifides, Athanasios. (2016) A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE). Norsk Informasjonssikkerhetskonferanse (NISK). volum 2016.
    Vitenskapelig artikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) A distributed continuous double auction framework for resource constrained microgrids. Lecture Notes in Computer Science (LNCS). volum 9578.
    Vitenskapelig artikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2015) Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks. Norsk Informasjonssikkerhetskonferanse (NISK).
    Vitenskapelig artikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Locating subverted processes using random packet comparison in SCADA systems. International Journal of Critical Infrastructures. volum 9 (1/2).
    Vitenskapelig artikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2012) Algorithmic approach for clandestine localisation and tracking in short-range environments. International Journal of Communication Networks and Distributed Systems. volum 9 (3/4).
    Vitenskapelig artikkel

Bøker

  • Bologna, Sandro; Hämmerli, Bernhard Markus; Gritzalis, Dimitris; Wolthusen, Stephen. (2013) Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers. Springer. 2013. ISBN 978-3-642-41476-3. Lecture Notes in Computer Science (6983).
    Vitenskapelig antologi/Konferanseserie
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer. 2012. ISBN 9783642289194. Lecture Notes in Computer Science (7130).
    Vitenskapelig antologi/Konferanseserie
  • Xenakis, Christos; Wolthusen, Stephen. (2011) Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers. Springer. 2011. ISBN 978-3-642-21693-0. Lecture Notes in Computer Science (6712).
    Vitenskapelig antologi/Konferanseserie

Del av bok/rapport

  • Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen. (2020) Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols. 16th International Conference on the Design of Reliable Communication Networks DRCN 2020.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model. 2020 IEEE Conference on Communications and Network Security (CNS).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nweke, Livinus Obiora; Wolthusen, Stephen. (2020) Resilience Analysis of Software-Defined Networks Using Queueing Networks. 2020 International Conference on Computing, Networking and Communications (ICNC).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2017) Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen. (2017) A Security Policy Infrastructure for Tactical Service Oriented Architectures. Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016 Heraklion, Crete, Greece, September 26–30, 2016 Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2017) Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids. 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Rigolin Ferreira Lopes, Roberto; Nieminen, Mikko; Viidanoja, Antti; Wolthusen, Stephen. (2017) Reactive/Proactive Connectivity Management in a Tactical Service-Oriented Infrastructure. 2017 International Conference on Military Communications and Information Systems (ICMCIS); May 15-16, 2017; Oulu, Finland.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2016) Recovering Structural Controllability on Erdős-Rényi Graphs via Partial Control Structure Re-Use. Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Cristoph. (2016) Privacy Violations in Constrained Micro-grids: Adversarial Cases. Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Foglietta, Chiara; Wolthusen, Stephen. (2016) Delay and Jitter Attacks on Hierarchical State Estimation. 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen D.. (2016) Securing tactical service oriented architectures. 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gkioulos, Vasileios; Wolthusen, Stephen; Flizikowski, Adam; Stachowicz, Anna; Nogalski, Dariusz; Gleba, Kamil; Sliwa, Joanna. (2016) Interoperability of security and quality of Service Policies Over Tactical SOA. Proc. of 2016 IEEE Symposium Series on Computational Intelligence (SSCI).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Kayem, Anne; Strauss, Heinrich; Wolthusen, Stephen D.; Meinel, Christoph. (2016) Key Management for Secure Demand Data Communication in Constrained Micro-grids. 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marufu, Anesu M.C.; Kayem, Anne V.D.M.; Wolthusen, Stephen. (2016) Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2016) An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms. Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2015) Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Information Security; 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2015) Structural Controllability Analysis via Embedding Power Dominating Set Approximation in Erd˝os-R´enyi Graphs. WAINA2015, IEEE 29th International Conference on Advanced Information Networking and Applications Workshops; 25-27 March 2015, Gwangju, Korea.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Kayem, Anne V.D.M.; Wolthusen, Stephen; Meinel, Christoph. (2015) Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids. Future Network Systems and Security: First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ambassa, Pacome L.; Wolthusen, Stephen; Kayem, Anne V.D.M.; Meinel, Christoph. (2015) Robust Snapshot Algorithm for Power Consumption Monitoring in Computationally Constrained Micro-Grids. 2015 IEEE Innovative Smart Grid Technologies - Asia Conference Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lopes, Roberto Rigolin Ferreira; Wolthusen, Stephen. (2015) Distributed Security Policies for Service-Oriented Architectures over Tactical Networks. Military Communications Conference, MILCOM 2015; October 26-28, 2015 Tampa, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Modelling Interdependencies over Incomplete Join Structures of Power Law Networks. 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2015) Secure distributed demand projection in micro-grids. 2015 Global Information Infrastructure and Networking Symposium (GIIS 2015) Guadalajara, Mexico 28 – 30 October 2015 - Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models. Information Security in Diverse Computing Environments.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2014) Malicious MPLS Policy Engine Reconnaissance. Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. Communications and Multimedia Security; 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2014) Mitigation of Cloud-Internal Denial of Service Attacks. IEEE Eighth International Symposium on Service Oriented System Engineering, SOSE 2014; 7–11 April 2014 Oxford, United Kingdom.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Wolthusen, Stephen. (2014) Recovery of Structural Controllability for Control Systems. Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alwasel, Bader; Wolthusen, Stephen. (2014) Reconstruction of Structural Controllability over Erd˝os-Rényi Graphs via Power Dominating Sets. Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 14; April 08 - 10, 2014, Oak Ridge, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen. (2014) Stability of Power Network State Estimation Under Attack. IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Baiocco, Alessio; Wolthusen, Stephen; Foglietta, Chiara; Panzieri, Stefano. (2014) A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation. The Fifth Conference on Innovative Smart Grid Technologies, ISGT 2014; February 19-22, 2014, Washington Grand Hyatt, USA.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2014) Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence. Critical Infrastructure Protection VIII; 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Mutairi, Abdulrahman; Wolthusen, Stephen. (2013) An Analysis of Service Degradation Attacks against Real-Time MPLS Networks. 2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Network and System Security, 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alarifi, Suaad; Wolthusen, Stephen. (2013) Robust Coordination of Cloud-Internal Denial of Service Attacks. Proceedings of IEEE Third International Conference on Cloud and Green Computing (CGC 2013) and IEEE Third International Conference on Social Computing and Its Applications (SCA 2013); 30 September – 2 October 2013, Karlsruhe, Germany.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alcaraz, Cristina; Miciolino, Estefanía Etchevés; Wolthusen, Stephen. (2013) Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal. Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Feng, Yangyue; Foglietta, Chiara; Baiocco, Alessio; Panzieri, Stefano; Wolthusen, Stephen. (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. e-Energy’13, Proceedings of the fourth international conference on Future energy systems.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Franke, Katrin; Hjelmås, Erik; Wolthusen, Stephen. (2013) Advancing Digital Forensics. Information Assurance and Security Education and Training.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Algebraic Analysis of Attack Impacts and Countermeasures in Critical Infrastructures. Critical Information Infrastructures Security 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2013) Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation. Critical Information Infrastructure Security; 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weldehawaryat, Goitom; Wolthusen, Stephen. (2013) Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs. Proceedings of the IEEE 2nd International Network Science Workshop (NSW); West Point, NY, USA, April 29 2013-May 1 2013.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Weston, Peter; Wolthusen, Stephen. (2013) Forensic Entropy Analysis of Microsoft Windows Storage Volumes. 2013 Information security for South Africa; Proceedings of the ISSA 2013 Conference; 14 – 16 August 2013; Johannesburg, South Africa.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lopez, Javier; Setola, Roberto; Wolthusen, Stephen. (2012) Overview of Critical Information Infrastructure Protection. Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2012) Towards Concurrent Data Sampling Using GPU Coprocessing. Proceedings of the Seventh International Conference on Availability, Reliability and Security, ARES 2012; 20-24 August 2012; Prague, Czech Republic.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2012) Modelling Approaches. Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2011) On the feasibility of carrying out live real-time forensics for modern intelligent vehicles. Forensics in telecommunications, information, and multimedia : third international ICST conference, e-forensics 2010, Shanghai, China, November 11-12, 2010, revised selected papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) A Propagation Model of A Vulnerability Mitigation Computer Worm – Seawave. 5th International Conference on Network and System Security; Milan, Italy, September 6-8, 2011.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2011) Threat Analysis Model of an Agent-Based Vulnerability Mitigation Mechanism Using Bayesian Belief Networks. 2011 IEEE, Network Science Workshop (NSW).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2011) A Formal Adversary Capability Model for SCADA Environments. Critical Information Infrastructure Security. 5th International Workshop, CRITIS 2010, Athens, Greece, September 2010, Revised Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Ebinger, Peter; Kuijper, Arjan; Wolthusen, Stephen. (2011) Resource-Constrained Signal Propagation Modeling for Tactical Mobile Ad Hoc Networks. 2011 IEEE, Network Science Workshop (NSW).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks. Digital Forensics and Cyber Crime.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks. Security and Privacy in Mobile Information and Communication Systems.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Forensic Tracking and Mobility Prediction in Vehicular Networks. Advances in Digital Forensics VI.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Kuwari, Saif; Wolthusen, Stephen. (2010) Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. Communications and Multimedia Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Agent-based host enumeration and vulnerability scanning using dynamic topology information. 2010, Information Security for South Africa (ISSA), Proceedings of the ISSA 2010 Conference.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2010) Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. Proceedings of the Fifth International Conference on Avaliability, Reliability and Security: ARES 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Lunden, Nils; Sveen, Robin; Lund, Hans; Svendsen, Nils Kalstad; Wolthusen, Stephen. (2010) Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments. Critical Infrastructure Protection IV.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Mairaj, Danish; Wolthusen, Stephen; Busch, Christoph. (2010) Teeth Segmentation and Feature Extraction for Odontological Biometrics. Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on - 15-17 Oct. 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems. The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Critical Infrastructure Protection IV.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Host-Based Security Sensor Integrity in Multiprocessing Environments. Information Security, Practice and Experience.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • McEvoy, Thomas Richard; Wolthusen, Stephen. (2010) Trouble Brewing: Using Observations of Invariant Behavior to Detect. Critical Information Infrastructures Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Riedmüller, Reinhard; Seeger, Mark M.; Baier, Harald; Busch, Christoph; Wolthusen, Stephen. (2010) Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection. 2nd International Workshop On Security and Communication networks (IWSCN), May 26-28, 2010, Karlstad, Sweden.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Seeger, Mark M.; Wolthusen, Stephen. (2010) Observation mechanism and cost model for tightly coupled asymmetric concurrency. The Fifth International Conference on Systems ICONS 2010 : 11-16 April 2010 Menuires, France.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Al-Salloum, Ziyad S.; Wolthusen, Stephen. (2009) Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Borgen, Halvor; Bours, Patrick; Wolthusen, Stephen. (2009) Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. Advances in Biometrics.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Busch, Christoph; Wolthusen, Stephen. (2009) Non-Forensic Odontological Biometrics. IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Ebinger, Peter; Wolthusen, Stephen. (2009) Efficient state estimation and Byzantine behavior identification in Tactical MANETs. Proceedings of the Military Communications Conference, MILCOM 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Reidt, Steffen; Wolthusen, Stephen. (2009) Energy-efficient key distribution and revocation in tactical networks with asymmetric links. Proceedings of the Military Communications Conference, MILCOM 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Modeling And Detecting Anomalies In Scada Systems. Critical Infrastructure Protection II.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Svendsen, Nils Kalstad; Wolthusen, Stephen. (2009) Using Physical Models for Anomaly Detection in Control Systems. Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Wolthusen, Stephen. (2009) Overcast: Forensic Discovery in Cloud Environments. IMF '09. Fifth International Conference on IT Security Incident Management and IT Forensics, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) A Security Analysis of Biometric Template Protection Schemes. Image Analysis and Recognition.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Zhou, Xuebing; Wolthusen, Stephen; Busch, Christoph; Kuijper, Arjan. (2009) Feature Correlation Attack on Biometric Privacy Protection Schemes. IIH-MSP '09. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Undervisning

Emner

  • IMT4125 - Network Security
  • IMT4203 - Kritisk infrastruktur - sikkerhet
  • IIKG6502 - Critical Infrastructure Security
  • IMT6003 - IIK Sommerskole
  • IMT6011 - Introduction to Information Security
NTNU kunnsap for en bedre verden
Studere
  • Studieprogram
  • Emner
  • Videreutdanning og deltid
  • Jobbmuligheter
  • Karriereutvikling
  • Studentaktiviteter
  • Studentblogger
  • Hvorfor velge NTNU
Kontakt
  • Kontakt oss
  • Finn ansatte
  • Skolebesøk og messer
  • Spør en ekspert
  • For alumni
  • Pressekontakter
Oppdag NTNU
  • Arrangement
  • Jobbe ved NTNU
  • Bilder og video
  • Nyheter
  • Kart
  • NTNU i Gjøvik
  • NTNU i Trondheim
  • NTNU i Ålesund
Om NTNU
  • Strategi
  • Forskning
  • Satsingsområder
  • Innovasjon
  • Utdanningskvalitet
  • Organisasjonskart
  • Om NTNU
Tjenester
  • For ansatte
  • For studenter
  • Blackboard
  • Innsida

Norges teknisk-naturvitenskapelige universitet

Bruk av informasjonskapsler
Tilgjengelighetserklæring
Personvern
Ansvarlig redaktør
Logg inn