Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks M Abomhara, GM Køien Journal of Cyber Security 4, 65-88, 2015 | 884 | 2015 |
Security and privacy in the Internet of Things: Current status and open issues M Abomhara, GM Køien 2014 international conference on privacy and security in mobile systems …, 2014 | 572 | 2014 |
Security aspects of 3G-WLAN interworking GM Køien, T Haslestad Communications Magazine, IEEE 41 (11), 82-88, 2003 | 167 | 2003 |
An introduction to access security in UMTS GM Koien IEEE Wireless Communications 11 (1), 8-18, 2004 | 115 | 2004 |
Reflections on trust in devices: an informal survey of human trust in an internet-of-things context GM Køien Wireless personal communications 61, 495-510, 2011 | 80 | 2011 |
Mutual entity authentication for LTE GM Køien 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 67 | 2011 |
A stride-based threat model for telehealth systems M Abomhara, M Gerdes, GM Køien Norsk informasjonssikkerhetskonferanse (NISK) 8 (1), 82-96, 2015 | 55 | 2015 |
Access security in CDMA2000, including a comparison with UMTS access security G Rose, GM Koien IEEE Wireless Communications 11 (1), 19-25, 2004 | 50 | 2004 |
Location privacy for cellular systems; analysis and solution GM Køien, VA Oleshchuk International Workshop on Privacy Enhancing Technologies, 40-58, 2005 | 40 | 2005 |
Globalization of mobile and wireless communications: Today and in 2020 R Prasad, S Dixit, R Van Nee, T Ojanpera Springer Science+ Business Media BV, 2011 | 37 | 2011 |
Privacy enhanced mutual authentication in LTE GM Koien 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 34 | 2013 |
Location-aware mobile intrusion detection with enhanced privacy in a 5G context N Ulltveit-Moe, VA Oleshchuk, GM Køien Wireless Personal Communications 57, 317-338, 2011 | 34 | 2011 |
Aspects of Personal Privacy in Communications-Problems, Technology and Solutions GM Køien, VA Oleshchuk River Publishers, 2013 | 33 | 2013 |
Privacy enhanced cellular access security GM Køien Proceedings of the 4th ACM workshop on Wireless security, 57-66, 2005 | 27 | 2005 |
On threats to the 5G service based architecture GM Køien Wireless Personal Communications 119 (1), 97-116, 2021 | 26 | 2021 |
Zero-trust principles for legacy components: 12 rules for legacy devices: an antidote to chaos GM Køien Wireless Personal Communications 121 (2), 1169-1186, 2021 | 22 | 2021 |
Security and Privacy in the Cloud-A Long-Term View VA Oleshchuk, GM Køien 2nd International Conference on Wireless Communications, Vehicular …, 2011 | 22 | 2011 |
Resource, mobility, and security management in wireless networks and mobile communications Y Zhang, H Hu, M Fujise CRC Press, 2006 | 20 | 2006 |
Entity authentication and personal privacy in future cellular systems GM Køien River Publishers, 2009 | 19* | 2009 |
Access control model for cooperative healthcare environments: Modeling and verification M Abomhara, H Yang, GM Køien 2016 IEEE International Conference on Healthcare Informatics (ICHI), 46-54, 2016 | 18 | 2016 |