default search action
Josef Noll
Person information
- affiliation: University of Oslo, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i6]Daniel Gerbi Duguma, Juliana Zhang, Meysam Aboutalebi, Shiliang Zhang, Catherine Banet, Cato Bjørkli, Chinmayi Prabhu Baramashetru, Frank Eliassen, Hui Zhang, Jonathan Muringani, Josef Noll, Knut Inge Fostervold, Lars Böcker, Lee Andrew Bygrave, Matin Bagherpour, Maunya Doroudi Moghadam, Olaf Owe, Poushali Sengupta, Roman Vitenberg, Sabita Maharjan, Thiago Garrett, Yushuai Li, Zhengyu Shan:
Privacy-preserving transactive energy systems: Key topics and open research challenges. CoRR abs/2312.11564 (2023) - 2022
- [j17]Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll:
A multidisciplinary definition of privacy labels. Inf. Comput. Secur. 30(3): 452-469 (2022) - 2021
- [j16]Maghsoud Morshedi, Josef Noll:
Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning. Future Internet 13(3): 63 (2021) - [j15]Christian Johansen, Aulon Mujaj, Hamed Arshad, Josef Noll:
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications. Secur. Commun. Networks 2021: 9965573:1-9965573:30 (2021) - [j14]Maghsoud Morshedi, Josef Noll:
Estimating PQoS of Video Streaming on Wi-Fi Networks Using Machine Learning. Sensors 21(2): 621 (2021) - 2020
- [j13]Manas Pradhan, Josef Noll:
Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems. IEEE Commun. Mag. 58(8): 14-20 (2020) - [j12]Manish Shrestha, Christian Johansen, Josef Noll, Davide Roverso:
A Methodology for Security Classification applied to Smart Grid Infrastructures. Int. J. Crit. Infrastructure Prot. 28: 100342 (2020) - [c28]Manish Shrestha, Christian Johansen, Josef Noll:
Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT. FMEC 2020: 244-249 - [i5]Marja Matinmikko-Blue, Sirpa Aalto, Muhammad Imran Asghar, Hendrik Berndt, Yan Chen, Sudhir Dixit, Risto Jurva, Pasi Karppinen, Markku Kekkonen, Marianne Kinnula, Panagiotis Kostakos, Johanna Lindberg, Edward Mutafungwa, Kirsi Ojutkangas, Elina Rossi, Seppo Yrjölä, Anssi Öörni, Petri Ahokangas, Muhammad Zeeshan Asghar, Fan Chen, Netta Iivari, Marcos Katz, Atte Kinnula, Josef Noll, Harri Oinas-Kukkonen, Ian J. Oppermann, Ella Peltonen, Hanna Saarela, Harri Saarnisaari, Anna Suorsa, Gustav Wikström, Volker Ziegler:
White Paper on 6G Drivers and the UN SDGs. CoRR abs/2004.14695 (2020) - [i4]Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll:
Privacy Labelling and the Story of Princess Privacy and the Seven Helpers. CoRR abs/2012.01813 (2020)
2010 – 2019
- 2019
- [j11]Arijit Datta, Vimal Bhatia, Josef Noll, Sudhir Dixit:
Bridging the Digital Divide: Challenges in Opening the Digital World to the Elderly, Poor, and Digitally Illiterate. IEEE Consumer Electron. Mag. 8(1): 78-81 (2019) - [c27]Bruno Dzogovic, Bernardo Santos, Josef Noll, Van Thuan Do, Boning Feng, Thanh Van Do:
Enabling Smart Home with 5G Network Slicing. ICCCS 2019: 543-548 - [c26]Elahe Fazeldehkordi, Olaf Owe, Josef Noll:
Security and Privacy in IoT Systems: A Case Study of Healthcare Products. ISMICT 2019: 1-8 - [c25]Elahe Fazeldehkordi, Olaf Owe, Josef Noll:
Security and Privacy Functionalities in IoT. PST 2019: 1-12 - [c24]Elin Sundby Boysen, Joakim Flathagen, Josef Noll:
Service-Aware Virtual Network Function placement in Software Defined Networks. WCNC 2019: 1-7 - [c23]Maghsoud Morshedi, Josef Noll:
Deploying Energy Efficient Wi-Fi Networks. WiMob 2019: 33-39 - 2018
- [c22]Thanh Van Do, Josef Noll, Sudhir Dixit, Bruno Dzogovic, Van Thuan Do, Boning Feng:
Reducing Inequalities with 5G Internet Light Network Slice. 5G World Forum 2018: 38-43 - [c21]Josef Noll, Sudhir Dixit, Danica Radovanovic, Maghsoud Morshedi, Christine Holst, Andrea Sylvia Winkler:
5G network slicing for digital inclusion. COMSNETS 2018: 191-197 - [c20]Maghsoud Morshedi, Josef Noll, Raheleh Kari:
Building Trustable Remote Monitoring and Management Systems. UCC Companion 2018: 213-219 - [i3]Christian Johansen, Aulon Mujaj, Hamed Arshad, Josef Noll:
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version). CoRR abs/1807.07952 (2018) - [i2]Johanna Johansen, Christian Johansen, Josef Noll:
InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version). CoRR abs/1808.09496 (2018) - 2015
- [j10]Iñaki Garitano, Seraj Fayyad, Josef Noll:
Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems. Wirel. Pers. Commun. 81(4): 1359-1376 (2015) - 2014
- [j9]Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie:
Measurable Security, Privacy and Dependability in Smart Grids. J. Cyber Secur. Mobil. 3(4): 371-398 (2014) - [c19]Núria Castell, Haiying Liu, Mike Kobernus, Arne J. Berre, Josef Noll, Erol Cagatay, Reidun Gangdal:
Mobile technologies and personalized environmental information for supporting sustainable mobility in Oslo: The Citi-Sense-MOB approach. EnviroInfo 2014: 699-706 - 2012
- [j8]Hemdan Bezabih, Brage Ellingsaeter, Josef Noll, Torleiv Maseng:
Digital Broadcasting: Increasing the Available White Space Spectrum Using TV Receiver Information. IEEE Veh. Technol. Mag. 7(1): 24-30 (2012) - [c18]Brage Ellingsaeter, Hemdan Bezabih, Josef Noll, Torleiv Maseng:
Using TV receiver information to increase cognitive white space spectrum. DySPAN 2012: 131-141 - [c17]Zahid Iqbal, Josef Noll:
Towards Semantic-Enhanced Attribute-Based Access Control for Cloud Services. TrustCom 2012: 1223-1230 - [i1]Brage Ellingsæter, Hemdan Bezabih, Josef Noll, Torleiv Maseng:
Using TV Receiver Information to Increase Cognitive White Space Spectrum. CoRR abs/1202.3018 (2012) - 2011
- [j7]Josef Noll, Mohammad M. R. Chowdhury:
5G: Service Continuity in Heterogeneous Environments. Wirel. Pers. Commun. 57(3): 413-429 (2011) - [j6]Sarfraz Alam, Mohammad M. R. Chowdhury, Josef Noll:
Interoperability of Security-Enabled Internet of Things. Wirel. Pers. Commun. 61(3): 567-586 (2011) - 2010
- [j5]Mohammad M. R. Chowdhury, Sarfraz Alam, Zahid Iqbal, Josef Noll:
Sociality brings Security in Content Sharing. J. Comput. 5(12): 1839-1846 (2010) - [c16]Sarfraz Alam, Josef Noll:
A Semantic Enhanced Service Proxy Framework for Internet of Things. GreenCom/CPSCom 2010: 488-495 - [c15]Sarfraz Alam, Mohammad M. R. Chowdhury, Josef Noll:
SenaaS: An event-driven sensor virtualization approach for Internet of Things cloud. NESEA 2010: 1-6
2000 – 2009
- 2009
- [j4]Mohammad M. R. Chowdhury, Najeeb Elahi, Sarfraz Alam, Josef Noll:
A framework for privacy in social communities. Int. J. Web Based Communities 5(2): 293-312 (2009) - [c14]György Kálmán, Josef Noll:
On Privacy Protection in Biometric Passports. ICDS 2009: 60-64 - [c13]Thomas Vilarinho, Kjetil Haslum, Josef Noll:
Advanced SIM Capabilities Supporting Trust-Based Applications. NordSec 2009: 223-238 - 2008
- [c12]Sarfraz Alam, Josef Noll, Dumitru Roman:
Semantic Policies for Service Access in Mobile Supported Sensor Networks. ICSNC 2008: 359-364 - [c11]György Kálmán, Josef Noll:
User controlled content access. ISWPC 2008: 185-188 - [c10]Mohammad M. R. Chowdhury, Javier Chamizo, Josef Noll, Juan Miguel Gómez:
Capturing Semantics for Information Security and Privacy Assurance. UIC 2008: 105-118 - [c9]Mohammad M. R. Chowdhury, Sarfraz Alam, Josef Noll:
Policy based access for home contents and services. CSTST 2008: 310-316 - 2007
- [c8]György Kálmán, Josef Noll:
Integrated Right Management for Home Content - A SIM based Right Management Solution for Home Networks. SECRYPT 2007: 107-111 - [c7]Mohammad M. R. Chowdhury, Juan Miguel Gómez, Josef Noll, Ángel García-Crespo:
SemID: Combining Semantics with Identity Management. SECURWARE 2007: 18-23 - [c6]Josef Noll, Mohammad M. R. Chowdhury, György Kálmán, Juan Miguel Gómez:
Semantically supported Authentication and Privacy in Social Networks. SECURWARE 2007: 83-88 - [c5]György Kálmán, Mohammad M. R. Chowdhury, Josef Noll:
Security for Ambient Wireless Services. VTC Spring 2007: 298-303 - 2006
- [c4]Josef Noll, Erik Lillevold:
Roadmap to ASG based Semantic Web Services. AICT/ICIW 2006: 129 - [c3]Josef Noll, Juan Carlos Lopez Calvet, Kjell Myksvoll:
Admittance Services through Mobile Phone Short Messages. ICWMC 2006: 77 - [c2]Josef Noll, György Kálmán, Ulf Carlsen:
License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys. WINSYS 2006: 333-338 - 2002
- [j3]Fred Daneshgaran, Josef Noll:
Special issue: Reconfigurable wireless communication systems. Wirel. Commun. Mob. Comput. 2(8): 785-787 (2002) - [j2]Josef Noll, Enrico Buracchini:
Software Radio - a key technology for adaptive access. Wirel. Commun. Mob. Comput. 2(8): 789-798 (2002) - [c1]Magne Pettersen, Gunnar Stette, Josef Noll:
Applicability of rough surface scattering to 3D radio planning. PIMRC 2002: 468-472
1990 – 1999
- 1999
- [j1]Wolfgang Wagner, Josef Noll, Maurice Borgeaud, Helmut Rott:
Monitoring soil moisture over the Canadian Prairies with the ERS scatterometer. IEEE Trans. Geosci. Remote. Sens. 37(1): 206-216 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint