André Årnes
André Årnes
Telenor Group, NTNU
Verified email at ntnu.no
Title
Cited by
Cited by
Year
Using hidden markov models to evaluate the risks of intrusions
A Årnes, F Valeur, G Vigna, RA Kemmerer
International Workshop on Recent Advances in Intrusion Detection, 145-164, 2006
136*2006
Real-time risk assessment with network sensors and intrusion detection systems
A Årnes, K Sallhammar, K Haslum, T Brekne, MEG Moe, SJ Knapskog
International conference on computational and information science, 388-397, 2005
812005
The persistence of memory: Forensic identification and extraction of cryptographic keys
C Maartmann-Moe, SE Thorkildsen, A Årnes
digital investigation 6, S132-S140, 2009
722009
Digital forensics
A Årnes
John Wiley & Sons, 2017
71*2017
Multisensor real-time risk assessment using continuous-time hidden markov models
K Haslum, A Årnes
International Conference on Computational and Information Science, 694-703, 2006
672006
Public key certificate revocation schemes
A Årnes
Masters thesis, 2000
672000
Selecting revocation solutions for PKI
A Arnes, M Just, SJ Knapskog, S Lloyd, H Meijer
Fifth Nordic Workshop on Secure IT Systems (NORDSEC 2000), 2000
662000
Anonymization of ip traffic monitoring data: Attacks on two prefix-preserving anonymization schemes and some proposed remedies
T Brekne, A Årnes, A Øslebø
International Workshop on Privacy Enhancing Technologies, 179-196, 2005
642005
Circumventing IP-address pseudonymization.
T Brekne, A Årnes
Communications and Computer Networks, 43-48, 2005
372005
Digital forensic reconstruction and the virtual security testbed ViSe
A Årnes, P Haas, G Vigna, RA Kemmerer
International Conference on Detection of Intrusions and Malware, and …, 2006
272006
Using a virtual security testbed for digital forensic reconstruction
A Årnes, P Haas, G Vigna, RA Kemmerer
Journal in Computer Virology 2 (4), 275-289, 2007
202007
A big data analytics approach to combat telecommunication vulnerabilities
K Jensen, HT Nguyen, T Van Do, A Årnes
Cluster Computing 20 (3), 2363-2374, 2017
18*2017
Practical use of Approximate Hash Based Matching in digital investigations
PC Bjelland, K Franke, A Årnes
Digital Investigation 11, S18-S26, 2014
172014
Storage and exchange formats for digital evidence
AO Flaglien, A Mallasvik, M Mustorp, A Årnes
digital investigation 8 (2), 122-128, 2011
162011
Non-expanding transaction specific pseudonymization for IP traffic monitoring
L Øverlier, T Brekne, A Årnes
International Conference on Cryptology and Network Security, 261-273, 2005
142005
Identifying malware using cross-evidence correlation
A Flaglien, K Franke, A Arnes
IFIP International Conference on Digital Forensics, 169-182, 2011
112011
Real-time risk assessment with network sensors and hidden markov model
A Årnes, K Sallhammar, K Haslum, SJ Knapskog
Proceedings of the 11th Nordic Workshop on Secure IT-systems (NORDSEC 2006), 2006
82006
Forensic geolocation of internet addresses using network measurements
EA Fossen, A Årnes
Nordsec 2005, 10th Nordic Workshop on Secure IT-systems, 2005
82005
Certificate Revocation Performance Simulations. project paper
A Arnes, M Just, S Lloyd, H Meijer
June, 2000
72000
A network based imsi catcher detection
S Steig, A Aarnes, T Van Do, HT Nguyen
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20