• Firewall models in cloud environments 

      Thingnes, Lars Gunnar (Master thesis, 2022)
      Denne oppgaven undersøker hvordan tradisjonelle sentraliserte og sonebaserte brannmurer kan migreres til moderne mikrosegmenterte og virtuelt distribuerte brannmurer. En slik migrering anses som en høy risiko siden den ...
    • Fjernavlesning av vannmålere med LoRa-teknologi 

      Kristensen, Daniel B.; Barhaugen, Kevin A.; Skaue, Kristian A.; Solstad, Hans Kristian T. (Bachelor thesis, 2019)
      I dag blir all vannavlesning i Ringsaker kommune gjort manuelt av huseierene. Teknisk drift i Ringsaker kommune er interessert i å automatisere denne prosessen, og LoRaWAN er en teknologi som kan bli brukt for å muliggjøre ...
    • Fleet Management Optimisation 

      Soltun, Sindre (Master thesis, 2007)
      This Master's Thesis is built around the concept of fleet management, focusing on designing and implementing a solution for such a purpose. As a target domain for this proposed system snow clearing has been chosen, and it ...
    • Fog Computing in Healthcare – A Review and Discussion 

      Kraemer, Frank Alexander; Bråten, Anders Eivind; Tamkittikhun, Nattachart; Palma, David (Journal article; Peer reviewed, 2017)
      Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ...
    • Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims 

      Berg, Silje; Thorvik, Tilde Gregusson; Meland, Per HÃ¥kon (Journal article; Peer reviewed, 2023)
      Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ...
    • Forecasting Electricity Load With Hybrid Scalable Model Based on Stacked Non Linear Residual Approach 

      Sinha, Ayush; Tayal, Raghav; Vyas, Aamod; Pandey, Pankaj; Vyas, O.P. (Peer reviewed; Journal article, 2021)
      Power has totally different attributes than other material commodities as electrical energy stockpiling is a costly phenomenon. Since it should be generated when demanded, it is necessary to forecast its demand accurately ...
    • Forensic analysis of an unknown embedded device 

      Eide, Jarle; Olsen, Jan Ove Skogheim (Master thesis, 2006)
      Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ...
    • Forensic Analysis of OOXML Documents 

      Didriksen, Espen (Master thesis, 2014)
      Microsoft Office 2007 and subsequent versions use an XML-based file format called Office Open XML (OOXML) for storing documents, spreadsheets and presentations. OOXML documents are often collected in forensic investigations, ...
    • Forensic Analysis of Physical Memory and Page File 

      Iqbal, Hameed (Master thesis, 2009)
      With the passage of time, the field of computer forensics is maturing and the traditional methodology of disk forensics has now become a standard. In the same manner volatile data forensics is also getting serious attention ...
    • Forensic Key Discovery and Identification: Finding Cryptographic Keys in Physical Memory 

      Maartmann-Moe, Carsten (Master thesis, 2008)
      Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present ...
    • Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode 

      Alendal, Gunnar; Dyrkolbotn, Geir Olav; Axelsson, Stefan (Journal article; Peer reviewed, 2018)
      The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security ...
    • Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives 

      Ystgaard, Kaja Fjørtoft; Kløften Lein, Silje; De Moor, Katrien Rachel W (Chapter, 2024)
      This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ...
    • Forretningsmodeller for trådløsutbygging langs vei 

      Hagan, Bjørn-Viggo (Master thesis, 2007)
      Utviklingen av trådløse teknologier gir opphav til stadig flere bruksområder. I denne oppgaven har jeg sett på tre av dem, nemlig kommunikasjon med kjøretøy i fart, SRO for veibelysning og vei-instrumentering. For hvert ...
    • Forretningspotensialet til Wi-Fi basert løsning for automatisk måleravlesning 

      Holla, Morten Lunde (Master thesis, 2011)
      Fokuset for denne oppgaven har vært å innhente informasjon om avansertemåle- og styringssystem (AMS) for å kunne vurdere potensialet for en Wi-Filøsning for AMS. Dette fordi det allerede i dag finnes store og profesjoneltdrevet ...
    • Forwarding algorithms in vehicular networks 

      Afroozeh, Amir (Master thesis, 2014)
      AbstractVehicular ad hoc networks are a kind of mobile ad hoc network in which themobile nodes are fast moving vehicles. The fast movement of vehicles causesconsiderable disconnections in network links and leads to changes ...
    • A Framework for Flexible Program Evolution and Verification of Distributed Systems 

      Owe, Olaf; Fazeldehkordi, Elahe; Lin, Jia-Chun (Peer reviewed; Journal article, 2020)
      Program evolution may reveal bad design decisions, misunderstandings, erroneous code, or erroneous specifications, because problems made early in the design of a system may not be discovered until much later in the life-time ...
    • Framework for generating IDS benchmarking Data sets 

      Skjølsvik, Stian (Master thesis, 2007)
      Benchmarking Intrusion Detection Systems, IDS, is needed for comparing different systems against each other and to determine how good a single system is. For this purpose there is a need to generate test data set, which ...
    • Framework for secure data collection and through integration with various APIs 

      Schonhowd, Sindre Davidsen; Voll, Magnus Lekanger; Wahlstrøm, Øivind (Bachelor thesis, 2023)
      Tussa er ett norskt selskap lokalisert på vestlandet som arbeider for å skape fremtidsrettet og miljøvennlige løsninger. Tussa ønsket en forbedret løsning på datainnsamlingen fra sine kunder gjennom Microsoft Intune, Cisco ...
    • A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery 

      Gajic, Marija; Heegaard, Poul Einar; Furdek, Marija (Chapter, 2020)
      The support of vital societal functions requires a reliable communication network, especially in the presence of crises and disastrous events. Disasters caused by natural factors including earthquakes, fires, floods or ...
    • A framework for using humanoid robots in the school learning environment 

      Mishra, Deepti; Parish, Karen; Lugo, Ricardo Gregorio; Wang, Hao (Peer reviewed; Journal article, 2021)
      With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ...