-
Pietrzak, Barbara; Ward, Adrian; Cheung, Man Kit; Schwendimann, Beat A.; Mollaoglu, Gurkan & Duong, Michael Tran
[Vis alle 33 forfattere av denne artikkelen]
(2018).
Education for the future.
Science.
ISSN 0036-8075.
360(6396),
s. 1409–1412.
doi:
10.1126/science.aau3877.
Vis sammendrag
We asked young scientists: Are our schools and universities adequately prepared to educate young people for future challenges? What is the most pressing issue in your field, and what one improvement could your country make to its current education system to prepare students to face it? The responses expressed concerns about the current state of education in countries around the world. Many students lack access to the information they need, and those with access are often constrained by curriculum that emphasizes rote learning and isolated subjects. Our respondents suggested a variety of improvements to prepare the next generation for success.
-
Ulltveit-Moe, Nils
(2017).
Inportance of Cyber Security to Secure Microgrid Control System Networks.
-
-
-
Ulltveit-Moe, Nils
(2015).
FrontScraper - Improving Assignment Marking Using Knowledge Metrics.
-
Ulltveit-Moe, Nils; Assev, Sigurd M.; Gjøsæter, Terje & Øysæd, Halvard
(2015).
FrontScraper – Digital Assessment Tool.
-
Tveit, Christina & Ulltveit-Moe, Nils
(2015).
Doktorbesøk på Gjerstad skole.
[Avis].
Aust Agder Blad.
Vis sammendrag
Under AbelSeminared forrige torsdag, hadde 4. og 6. klasse besøk av 1. amanuensis ved Universitetet i Agder. Doktor Nils Ulltveit-Moe holdt foredrag om forskning, spill og lek.
-
Øybekk, Kristen & Ulltveit-Moe, Nils
(2015).
Doktorer som leker.
[Internett].
http://www.igjerstad.no/doktorer-som-leker.
Vis sammendrag
Gjerstad kan skilte med mer enn 10 doktorer. Det må være godt over landsgjennomsnittet folketallet tatt i betraktning. Den første var Ingeborg Ulltveit-Moe, tanta til doktor Nils. Han er den foreløpige siste doktoren Gjerstad har fått. Under AbelSeminaret forrige torsdag, hadde 4. og 6. klasse besøk av 1. amanuensis ved Universitetet i Agder UiA, doktor Nils Ulltveit-Moe. Han hadde foredraget "Forskning, spill og lek".
-
Gjøsæter, Terje; Ulltveit-Moe, Nils & Nergaard, Henrik
(2015).
Security and Privacy in the SEMIAH Home Energy Management System.
-
Gjøsæter, Terje; Nergaard, Henrik & Ulltveit-Moe, Nils
(2015).
SEMIAH Security and Privacy leaflet.
Vis sammendrag
Shifting energy consumption from
peaks to off-peaks where there is
high generation of electricity from
renewable energy sources
-
Ulltveit-Moe, Nils & Gjøsæter, Terje
(2015).
Forskning - Spill og Lek ?
-
Krell, Claudia & Ulltveit-Moe, Nils
(2015).
Hands-on verinice screencasts.
[Internett].
Verinice.
Vis sammendrag
From installing and working with verinice to importing OpenVAS scans: 16 screencasts, produced by Nils Ulltveit-Moe, guide users through the OpenSource information security management system (ISMS). They're all available via YouTube.
-
-
Smith, Paul; Ulltveit-Moe, Nils & Grassi, Leonardo
(2015).
Applied Methodology for the Protection of Industrial Control Systems.
Vis sammendrag
We have demonstrated use of the PRECYSE methodology. Tests done on the two demonstrators illustrate that the methodology can be used to identify security vulnerabilities and map these to prioritised risks. The PRECYSE methodology has proved to be effective in reducing the measured gap in security.
-
Ulltveit-Moe, Nils
(2015).
arftoverinice - ARF to Verinice .vna conversion filter.
Vis sammendrag
This program converts reports from the OpenVAS vulnerability scanner in the Asset Reporting Format (ARF) and generates a .vna file containing assets and risks generated from the ARF report. This file can be imported into the Verinice risk assessment system.
-
Ulltveit-Moe, Nils
(2014).
Science ethics: Young scientists speak [14].
Science.
ISSN 0036-8075.
345(6192).
doi:
10.1126/science.345.6192.24.
-
-
Ulltveit-Moe, Nils
(2014).
My Experience doing a PhD.
-
Ulltveit-Moe, Nils
(2014).
Reversible Anonymiser for XML Documents.
Vis sammendrag
This project contains an XACML controlled reversible anonymisation scheme for XML documents. The tool consists of an anonymiser and deanonymiser which are implemented as proxy based web services. It allows for anonymisation and authorisation of information in XML documents down to octet ranges of elements and attributes of messages. It supports multi-level security, default PERMIT and DENY anonymisation policies, key sharing and location-based authorisation using the GeoXACML framework. The current implementation can anonymise IDMEF messages from intrusion detection systems, in order to implement privacy-enhanced IDS services. It can relatively easily be modified to handle other XML formats.
-
Ulltveit-Moe, Nils
(2014).
Cloud-based Mobile Health Apps.
-
-
Ulltveit-Moe, Nils; Lid, Geir & Øigård, Stein Harald
(2014).
Kunnskapens teaterscene.
[Avis].
Agderposten.
Vis sammendrag
Han har forsket seg frem mot denne dagen i fem år. Nå skal all hans faglige kunnskap opp til utprøving og til doms – på noen timer.
-
Ulltveit-Moe, Nils
(2014).
Privacy-enhanced Network Monitoring.
-
Ulltveit-Moe, Nils
(2014).
Privacy enhancing Technologies for Cloud Computing.
-
Ulltveit-Moe, Nils & Walstad, Svein
(2014).
Doktoranden fra Mo.
[Internett].
Aust-Agder Blad.
Vis sammendrag
De fleste av våre lesere vet godt hvem Olav Ulltveit-Moe i Gjerstad er. Men sønnen Nils, som også bor på Mo, er nok ikke så kjent. Selv om han forsker på og fronter store EU-prosjekter om datasikkerhet. Tirsdag 8. april skal han forsvare sin doktorgradsavhandling som går på hvordan man kan redusere personvernlekkasje ved dataovervåkning.
-
Ulltveit-Moe, Nils; Welhaven Løchen, Liv Eva & Raustøl, Håvard
(2014).
Han vil redde dine opplysninger.
[Internett].
NRK Sørlandet.
Vis sammendrag
UiA-lektor Nils Ulltveit- Moe mener å ha funnet ut hvordan man kan hindre personvernlekkasje ved dataovervåkning.
-
Ulltveit-Moe, Nils & Raustøl, Håvard
(2014).
Radiointervju med Nils Ulltveit-Moe på Sørlandssendinga om doktorgradsavhandlingen "Personvernforbedret dataovervåkning".
[Radio].
NRK Sørlandet.
-
Ulltveit-Moe, Nils & Walstad, Svein
(2014).
Tar doktorgrad og forsker på datasikkerhet i Europa.
[Avis].
Aust-Agder Blad.
Vis sammendrag
Gjersdølingen Nils Ulltveit-Moe forsker på, og fronter flere EU prosjekter om datasikkerhet. 8. april skal han dessuten forsvare sin doktorgradsavhandling som omhandler reduksjon av personvernlekkasje ved dataovervåkning.
-
Ulltveit-Moe, Nils
(2014).
SnakeSpeed - Compete with Snakes on Eating the Frog.
-
Ma, Zhendong; Smith, Paul; McLaughlin, Kieran; Ulltveit-Moe, Nils & Kippe, Jörg
(2014).
PRECYSE Security Technologies for Critical Infrastructure Security.
-
Ulltveit-Moe, Nils & Grassi, Leonardo
(2014).
PRECYSE Framework for ICS Security: Methodology, Architecture and Test suite.
-
Ulltveit-Moe, Nils & Gjøsæter, Terje
(2014).
WP2 Methodology to identify assets and associated threats and vulnerabilities.
-
-
Gjøsæter, Terje & Ulltveit-Moe, Nils
(2013).
WP2 - Methodology to identify assets and associated threates and vulnerabilities - Risks and Challenges.
-
Gjøsæter, Terje & Ulltveit-Moe, Nils
(2013).
WP2 - Methodology to identify assets and associated threats and vulnerabilities.
-
Gjøsæter, Terje & Ulltveit-Moe, Nils
(2013).
Consortium Partner Presentation - University of Agder (UiA).
-
Ulltveit-Moe, Nils & Gjøsæter, Terje
(2013).
PRECYSE WP2 Methodology: Architectural issues, D2.2, Action plan.
-
Ulltveit-Moe, Nils
(2013).
PRECYSE Architecture from a Strategic Planning and Operational Perspective.
-
Ulltveit-Moe, Nils
(2013).
PRECYSE Architecture from a Strategic Planning and Operative Perspective.
-
Cáceres, Santiago; Marqués, Antonio; Ulltveit-Moe, Nils & Francavilla, Gianpiero
(2012).
PRECYSE, Prevention, Protection and Reaction to Cyber Attacks to Critical Infrastructures.
-
Ulltveit-Moe, Nils
(2012).
Norsk PRECYSE Brukergruppe Kravvalideringsworkshop.
-
Ulltveit-Moe, Nils
(2012).
PRECYSE - Prevention and Reaction to Cyber Attacks on Critical Infrastructures.
-
Ulltveit-Moe, Nils
(2012).
WP2 Methodology Workshop, Finalisation of D2.1 Methodology Specification.
-
Ulltveit-Moe, Nils
(2012).
WP2 Methodology and Supporting Tools.
-
Ulltveit-Moe, Nils
(2012).
WP2 Requirements Analysis.
-
Ulltveit-Moe, Nils
(2012).
WP2 kickoff meeting.
-
Ulltveit-Moe, Nils
(2012).
WP2 Methodology to Identify Assets and Associated Threats and Vulnerabilities.
-
Ulltveit-Moe, Nils
(2011).
Fullfinansiert doktorgradsutdanning - kan Norge fortsette med dette som snart eneste land i Europa?
-
Ulltveit-Moe, Nils
(2010).
Ethics of Network Monitoring.
Vis sammendrag
There is a need for increased ethical awareness and better ethical guidelines both for computer security managers and practitioning security analysts. The current situation is that network monitoring in some areas may be too privacy invasive, whereas other areas, like investigation of transnational on-line crime, is impeded both by lack of electronic evidence and legal hindrances across national borders. This article proposes how Kant's deontological ethics can be applied to network monitoring for solving the privacy against security dilemma. It also discusses reasons to consider better handling of information privacy from a Utilitarian perspective. Network monitoring is shown to benefit from basing moral decisions on quantifiable privacy and security metrics both from a Utilitarian and Kantian perspective. Another moral problem that is analysed, is whether automatic blocking of malicious traffic is better than surveillance of such activities. It also discusses how incentive compatible contractual means can be used to reduce the Moral Hazard both from a privacy and security perspective for outsourced network monitoring. Furthermore, the analysis identifies a need to inform moral agents about network monitoring in order to deter rational adversaries. It is not common practice to give such information for monitored networks today.
-
Ulltveit-Moe, Nils
(2009).
Privacy-Enhanced Network Monitoring.
Vis sammendrag
Emphasis of this talk: present a set of techniques that may be useful for privacy-enhanced network monitoring.
How can we improve privacy without loosing too much efficiency and usability? The main focus is on intrusion detection systems (IDS). Some examples on traffic analysis systems. The focus is not on how to reduce the false positive rate. (Although smaller FP rate would make privacy handling easier.)
-
-
-
-
-
Sharma, Arvind; Kolhe, Mohan Lal & Ulltveit-Moe, Nils
(2021).
Techno-Economic Performance Evaluation of Photovoltaic based Micro-Grid with Energy Management Strategies.
Universitetet i Agder.
ISSN 978-82-8427-018-0.
Fulltekst i vitenarkiv
Vis sammendrag
The operational performance of grid connected micro-grid system can be affected by many factors e.g. techno-economic sizing, appropriate energy management strategy, geographical locations, grid constrains and electricity energy pricing dynamics. To make renewable energy based micro-grid system more reliable as well as efficient and economically viable, it is imperative to consider a holistic approach and investigate all these factors for design and operation of the micro-grid system. In this work, techno-economic sizing of distributed generator(s) with energy storage are analyzed for operating grid connected PV based system as a micro-grid, even during the possible grid outage period. Energy management strategies have been proposed and evaluated for improving techno-economic performance of the PV based micro-grid system. Performance of the micro-grid system can be significantly improved using appropriate energy management strategies for maximizing the use of local energy resources and battery energy throughput. Impact of electricity energy pricing dynamics has been analyzed for techno-economic operation of the grid connected PV based micro-grids at the selected geographical locations (i.e. Tropical and Nordic climates). The local grid limits on the operation of the micro-grid system has been evaluated for maximizing the local energy resources utilization with consideration of peak demand and energy pricing. The regional energy pricing dynamics and local grid limits have considerable impact on performance of the PV based micro-grid. The maximum penetration of PV based micro-grid (i.e. hosting capacity study) within the distribution power network has been assessed considering the network constraints (e.g. voltage or/and loading of the power lines, etc.) and they have significant impact on PV capacity installations at different buses. The increasing penetration of PV based micro-grid system affects the voltage quality within the distribution network. The reactive power versus voltage (Q-V) droop control technique has been evaluated for managing the voltage profile within the prescribed limits. The Q-V droop function has been implemented in the PV inverter and tested its operation using the real time digital simulator and power hardware- in- loop method for improving the voltage profile within the distributed network. The presented results in this work are going to be useful for promoting the PV based micro-grid within the distribution network.
-
Ulltveit-Moe, Nils; Nergaard, Henrik; Erdödi, László; Gjøsæter, Terje; Kolstad, Erland & Berg, Pål
(2016).
Secure Information Sharing in an Industrial Internet of Things.
arXiv.org.
Vis sammendrag
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term solutions for protecting IIoT devices. The short-term solution is mainly based on integrating existing good practices. The paper also outlines a long term solution for protecting IIoT devices with fine-grained access control for sharing data between external entities that would support cloud-based data storage.
-
-
Henriksen, Bjørnar; Kolstad, Erland; Unander, Harald; Ulltveit-Moe, Nils & Gjøsæter, Terje
(2015).
SEMIAH D3.1 Verification and Validation Plan.
SEMIAH Consortium.
Vis sammendrag
This document contains a high-level verification and validation plan for SEMIAH. It describes the
test strategy and methods that will be utilised to complement the software development activities in
WP6.
The SEMIAH test strategy is mainly based on International Software Testing Qualifications Board’s
(ISTQB’s) Agile Test Extension [1]. The testing activities will be divided in four phases: feature
development, continuous integration, system test, and pilot system.
The business requirements will be validated in acceptance tests through exploratory testing.
Features or functionalities of the SEMIAH system will be tested in the feature acceptance tests
during the development phase. Nominated feature tests will also be included in the system test and
regression testing. Non-functional requirements will be tested either as a natural part of the feature
development or during system integration or system test activities.
In the integration and system test phases the system will be built step-by-step as new features are
delivered from the feature development tasks. At the end, a final system acceptance test will be
conducted before the system is released for pilot testing in actual homes.
Verification of Develco, Netplus, and Fraunhofer OGEMA products and their wireless interfaces
towards appliances or smart devices are not part of this test strategy, nor is the testing of research
features that are not to be integrated in the pilot system.
-
-
Ulltveit-Moe, Nils
(2015).
Verinice Course for PRECYSE.
Sourceforge.
Vis sammendrag
This document describes how to use Verinice for performing risk assessments according to the PRECYSE methodology for critical information infrastructures. It was used as an internal course in how to use Verinice in the PRECYSE project. The document amongst others describes how to import data from the vulnerability scanner OpenVAS, and how to model the identified vulnerabilities as risks. It also shows how risks can be mitigated by using countermeasures from the MAGERIT catalogue of countermeasures developed by the project.
-
Ulltveit-Moe, Nils & Oleshchuk, Vladimir
(2013).
Measuring privacy leakage for IDS rules.
eprint arXiv:1308.5421.
Vis sammendrag
This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis shows that the metric is able to distinguish between IDS rules that have no or low expected privacy leakage and IDS rules with a significant risk of leaking sensitive information, for example on user behaviour. The analysis is based on measurements of number of IDS alarms, data length and data entropy for relevant parts of IDS rules (for example payload). This is a promising approach that opens up for privacy benchmarking of Managed Security Service providers.