• Unmanned Aerial Vehicles as Data Mules: An Experimental Assessment 

      Palma, David; Zolich, Artur Piotr; Jiang, Yuming; Johansen, Tor Arne (Journal article; Peer reviewed, 2017)
      Communication in remote locations, specially in high-latitude regions, such as the Arctic, is challenged by the lack of infrastructures and by the limited availability of resources. However, these regions have high scientific ...
    • Unmasking the cheating student 

      Fazlagic, Aziz (Master thesis, 2023)
      Til tross for utviklingen av mange plagiatdeteksjonsverktøy i løpet av de siste tiårene, er disse tradisjonelle verktøyene fortsatt utilstrekkelige når det gjelder å oppdage kontraktsjuks, hvor studenter kjøper originale ...
    • Unmasking the Cheating Student 

      Veggeland, Lars Otterstad (Master thesis, 2023)
      Juks i akademia er sannsynligvis like gammelt som akademia selv, og hyppigheten ser ikke ut til å avta til tross for økt bevisstgjøring rundt akademisk integritet. Fremveksten av datamaskiner og internett har påvirket ...
    • Unsupervised Anomaly Detection 

      Barhaugen, Kevin Abadi (Master thesis, 2023)
      Denne forskningen tar sikte på å undersøke om uovervåket unormal deteksjon kan brukes til å oppdage unormaliteter i samtaler brukt i et svært partisk datasett. Et nettchatbasert datasett fra selskapet Børns Vilkår ble ...
    • Unsupervised Denoising for Super-Resolution (UDSR) of Real-World Images 

      Prajapati, Kalpesh; Chudasama, Vishal; Patel, Heena; Sarvaiya, Anjali; Upla, Kishor; Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph (Peer reviewed; Journal article, 2022)
      Single Image Super-Resolution (SISR) using Convolutional Neural Networks (CNNs) for many applications in supervised manner has resulted in significant improvement in state-of-the-art performance. Such supervised models ...
    • URL Crawling & classification system 

      Vaagland, Emil Lindgjerdet (Master thesis, 2012)
      Today, malware is often found on legitimate web sites that have been hacked. The aim of this thesis was to create a system to crawl potential malicious web sites and rate them as malicious or not. Through research into ...
    • Us against the World: Detection of Radical Language in Online Platforms 

      Theisen, Esther; Bours, Patrick; Agarwal, Nancy (Journal article; Peer reviewed, 2021)
    • Usability and security in a messaging prototype for mobile phones 

      Aas, Lars Mikkel (Master thesis, 2007)
      NORSK: SMS meldinger i dagens GSM nettverk er ikke a betrakte som sikre. Denne masteroppgaven vil undersøke spørsmål knyttet til brukeropplevelser av en prototype for sikre meldinger på mobiltelefoner. Vi har gjennomført ...
    • Usability, Security, and Privacy Recommendations for Mobile Parental Control 

      Gnanasekaran, Vahiny; de Moor, Katrien Rachel W (Chapter, 2023)
      Current mobile parental control aids parents in monitoring their children’s digital usage. Although many children are below 13 when receiving their first smartphone and social media accounts, only a few parents adopt such ...
    • Use of Authentication Mechanisms and Biometrics in Norwegian Industry 

      Noghondar, Elham Rajabian (Master thesis, 2010)
      This thesis will estimate use of authentication mechanism and biometric systems used in Norwegian industry. We will investigate how different factors influence the usage and application of authentication/identification ...
    • Use of cyber attack and defense agents in cyber ranges: A case study 

      Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2022)
      With the ever-changing cybersecurity landscape, the need for a continuous training for new cybersecurity skill sets is a requirement. Such continuous training programs can be delivered on platforms like cyber ranges. Cyber ...
    • The use of d-truncated Gröbner bases in cryptanalysis of symmetric ciphers 

      Amundsen, Jens-Are (Master thesis, 2010)
      ENGELSK: Solving systems of multivariate polynomial equations is hard, even NP-hard in the general case. The method of Göbner bases can be used to solve such systems, and thus has a running time complexity at least that ...
    • The Use of Frequent Episodes in Intrusion Detection 

      Kokorina, Liubov (Master thesis, 2009)
      In today’s intrusion detection systems (IDSs), a trade-off between efficiency and accuracy must be achieved. Because of that, the decision on structures for representing patterns of normal and intrusive behavior are of ...
    • Use of Gamification in Security Awareness and Training Programs 

      Gjertsen, Eyvind Garder B (Master thesis, 2016)
      The security reports are unambiguous: the human factor constitutes a real vulnerability in the information security domain. It is crucial that employees of companies and governments understand the risks and threats connected ...
    • The use of k-best paths algorithms in clock control sequence reconstruction 

      Herland, Turid (Master thesis, 2006)
      NORSK: Nøkkelstraumgeneratorar som er baserte på klokkekontrollerte lineært tilbakekopla skiftregister blir ofte brukte i fytchiffer-system. Kryptoanalyse av slike generatorar kan delast inn i to etappar: Den første ...
    • The use of Levenshtein distance in computer forensics 

      Mangnes, Bjarne (Master thesis, 2005)
      NORSK: Vi benytter oss av datateknologi i stadig størrre grad, og denne teknologien er i ferd med å bli en viktig del av vår hverdag. Bruk av denne teknologien åpner opp mange nye muligheter, men kan også misbrukes til ...
    • Use of Messaging Layer Security in a Military UAV Swarm 

      Marstrander, Emil (Master thesis, 2023)
      Forskning på flyvende dronesvermer har fått betydelig interesse de siste årene. En militær dronesverm kan utføre risikofylte oppdrag med lavere risiko for personellet, men introduserer en økt risiko for at fienden ...
    • Use of Serious Games to Incorporate Security Awareness Programs with Skills Training 

      White, William (Master thesis, 2020)
      The purpose of this study is to determine the possibility of addressing the shortcoming of Security Awareness training in providing Skills training. The study will also determine if it is possible to create a Serious Game ...
    • User Authentication in Multi-mode Mobile Phones 

      Kulseth, Torild (Master thesis, 2007)
      IMS-WLAN interworking is a step towards extending IMS functionality into other access technologies, but this architecture is very comprehensive and is unlikely to be employed everywhere. The result is a need for alternative ...
    • User Engagement in Game-based Student Response Systems: A Case Study on Kahoot! 

      Skøien, Julie Alice (Master thesis, 2018)
      Among all the new applications and services coming, are technological tools one can benefit from, in fields such as educational environments. The increased use of technology in schools has opened up for new ways of learning, ...