André Årnes
André Årnes
Telenor Group, NTNU
Verified email at ntnu.no
Title
Cited by
Cited by
Year
Using hidden markov models to evaluate the risks of intrusions
A Årnes, F Valeur, G Vigna, RA Kemmerer
International Workshop on Recent Advances in Intrusion Detection, 145-164, 2006
124*2006
Real-time risk assessment with network sensors and intrusion detection systems
A Årnes, K Sallhammar, K Haslum, T Brekne, MEG Moe, SJ Knapskog
International conference on computational and information science, 388-397, 2005
792005
Public key certificate revocation schemes
A Årnes
Masters thesis, 2000
672000
The persistence of memory: Forensic identification and extraction of cryptographic keys
C Maartmann-Moe, SE Thorkildsen, A Årnes
digital investigation 6, S132-S140, 2009
662009
Multisensor real-time risk assessment using continuous-time hidden markov models
K Haslum, A Årnes
International Conference on Computational and Information Science, 694-703, 2006
652006
Selecting revocation solutions for PKI
A Arnes, M Just, SJ Knapskog, S Lloyd, H Meijer
Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000), 2000
642000
Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies
T Brekne, A Årnes, A Øslebø
International Workshop on Privacy Enhancing Technologies, 179-196, 2005
592005
Digital forensics
A Årnes
John Wiley & Sons, 2017
52*2017
Circumventing IP-address pseudonymization.
T Brekne, A Årnes
Communications and Computer Networks, 43-48, 2005
332005
Digital forensic reconstruction and the virtual security testbed ViSe
A Årnes, P Haas, G Vigna, RA Kemmerer
International Conference on Detection of Intrusions and Malware, and …, 2006
242006
Using a virtual security testbed for digital forensic reconstruction
A Årnes, P Haas, G Vigna, RA Kemmerer
Journal in Computer Virology 2 (4), 275-289, 2007
192007
A big data analytics approach to combat telecommunication vulnerabilities
K Jensen, HT Nguyen, T Van Do, A Årnes
Cluster Computing 20 (3), 2363-2374, 2017
16*2017
Practical use of Approximate Hash Based Matching in digital investigations
PC Bjelland, K Franke, A Årnes
Digital Investigation 11, S18-S26, 2014
162014
Storage and exchange formats for digital evidence
AO Flaglien, A Mallasvik, M Mustorp, A Årnes
digital investigation 8 (2), 122-128, 2011
152011
Non-expanding transaction specific pseudonymization for IP traffic monitoring
L Øverlier, T Brekne, A Årnes
International Conference on Cryptology and Network Security, 261-273, 2005
132005
Identifying malware using cross-evidence correlation
A Flaglien, K Franke, A Arnes
IFIP International Conference on Digital Forensics, 169-182, 2011
122011
Real-time risk assessment with network sensors and hidden markov model
A Årnes, K Sallhammar, K Haslum, SJ Knapskog
Proceedings of the 11th Nordic Workshop on Secure IT-systems (NORDSEC 2006), 2006
82006
Forensic geolocation of internet addresses using network measurements
EA Fossen, A Årnes
Nordsec 2005, 10th Nordic Workshop on Secure IT-systems, 2005
82005
Certificate Revocation Performance Simulations. project paper
A Arnes, M Just, S Lloyd, H Meijer
June, 2000
62000
Open access networks
E Edvardsen, TG Eskedal, A Årnes
International Symposium on Networks and Services for the Information Society …, 2002
52002
The system can't perform the operation now. Try again later.
Articles 1–20