Now showing items 1489-1508 of 2525

    • A Multidimensional Cyber Defense Exercise: Emphasis on Emotional, Social, and Cognitive Aspects 

      Maennel, Kaie; Brilingaitė, Agnė; Bukauskas, Linas; Juozapavičius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan (Peer reviewed; Journal article, 2023)
      Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, ...
    • Multilevel Fusion of Multispectral Images to Detect the Artificially Ripened Banana 

      Vetrekar, Narayan; Ramachandra, Raghavendra; Gad, R.S. (Journal article, 2023)
    • Multilingual Audio-Visual Smartphone Dataset and Evaluation 

      Mandalapu, Hareesh; Reddy, P. N. Aravinda; Ramachandra, Raghavendra; Rao, Krothapalli Sreenivasa; Mitra, Pabitra; Prasanna, S. R. Mahadeva; Busch, Christoph (Peer reviewed; Journal article, 2021)
      Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging ...
    • Multilingual Voice Impersonation Dataset and Evaluation 

      Mandalapu, Hareesh; Busch, Christoph; Ramachandra, Raghavendra (Chapter, 2021)
      Well-known vulnerabilities of voice-based biometrics are impersonation, replay attacks, artificial signals/speech synthesis, and voice conversion. Among these, voice impersonation is the obvious and simplest way of attack ...
    • Multimedia Distribution Networks and the Aeetes Project 

      Sørensen, Svein-Magnus Bergan (Master thesis, 2006)
      This thesis provides an introduction to the field of Multimedia Distribution Networks (MDN) and is written as the first part the Aeetes Project. It compares potential MDN architectures and technologies, and makes a proposal ...
    • Multimodality for Reliable Single Image Based Face Morphing Attack Detection 

      Ramachandra, Raghavendra; Li, Guoqiang (Peer reviewed; Journal article, 2022)
      Face morphing attacks have demonstrated a high vulnerability on human observers and commercial off-the-shelf Face Recognition Systems (FRS), especially in the border control scenario. Therefore, detecting face morphing ...
    • Multinomial malware classification based on call graphs 

      Østbye, Morten Oscar (Master thesis, 2017)
      Ever since the computer was invented, people have found ways to evolve interaction or simplify tasks with computational resources, this for both good and bad. For the known lifespan of the digital age, malicious software ...
    • Multinomial malware classification using control flow graphs 

      Håland, Magnus Simonsen (Master thesis, 2019)
      I disse dager med personlige datamaskiner og Internett har skadelig programvare (skadevare) blitt en økende trussel. Antall hendelser som involverer skadevare, som har forårsaker betydelige skader for både private og ...
    • Multinomial malware classification via low-level features 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Journal article; Peer reviewed, 2018)
      Because malicious software or (”malware”) is so frequently used in a cyber crimes, malware detection and relevant research became a serious issue in the information security landscape. However, in order to have an appropriate ...
    • Multipeople tracking across multiple cameras 

      Alaya Cheikh, Faouzi; Saha, Sajib Kumar; Rudakova, Victoria; Wang, Peng (Journal article; Peer reviewed, 2012)
      Multi-target tracking (MTT) is an active and challenging research topic. Many different approaches to MTT problem exist, yet there are still few satisfactory methods of solving multi-target occlusion problem, which often ...
    • A multiplayer game model to detect insiders in wireless sensor networks 

      Kantzavelou, Ioanna; Maglaras, Leandros; Tzikopoulos, Panagiotis F.; Katsikas, Sokratis (Peer reviewed; Journal article, 2022)
      Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In Wireless Sensor Networks (WSNs), significant ...
    • Multiple Escrow Agents in VoIP 

      Azfar, Abdullah (Master thesis, 2010)
      Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, ...
    • Multipurpose platform for Security Analysts 

      Amundsen, May-Liss Rosendahl; Vrenne, Steinar; Wahl, Martin; Lindvall, Marius Ødegård (Bachelor thesis, 2021)
      Kongsberg Gruppen er et internasjonalt teknologikonsern som utvikler høyteknologiske systemer til kunder innen olje og gass, frakt, forsvar og romfartsindustri. Kongsberg Cyber Security Center er avdelingen innen Kongsberg ...
    • Multisensor Fusion for Intrusion Detection and Situational Awareness 

      Hallstensen, Christoffer V (Master thesis, 2017)
      Cybercrime damage costs the world several trillion dollars annually. And al-though technical solutions to protect organizations from hackers are being con-tinuously developed, criminals learn fast to circumvent ...
    • Multisided platforms: Classification and analysis 

      Øverby, Harald; Audestad, Jan A. (Peer reviewed; Journal article, 2021)
      The multisided platform (MSP) is an essential business construct in the digital economy. Some of the largest companies in the world—including Google, Amazon, and eBay—exploit the MSP in their business models. Fundamental ...
    • Multispectral Imaging using a Stereo Camera: Concept, Design and Assessment 

      Shrestha, Raju; Mansouri, Alamin; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2011)
      This paper proposes a one-shot six-channel multispectral color image acquisition system using a stereo camera and a pair of optical filters. The two filters from the best pair selected from among readily available filters ...
    • Multispectral imaging: narrow or wide band filters? 

      Wang, Xingbo; Thomas, Jean-Baptiste; Hardeberg, Jon Yngve; Gouton, Pierre (Journal article; Peer reviewed, 2014)
      In every aspect, spectral characteristics of filters play an important role in an image acquisition system. For a colorimetric system, traditionally, it is believed that narrow-band filters give rise to higher accuracy ...
    • MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS PRODUCED BY QUASIGROUPS 

      Samardjiska, Simona (Doctoral thesis at NTNU;2015:101, Doctoral thesis, 2015)
      Multivariate public key cryptography (MPKC) is the study of public key cryptosystems based on the NP-hard problem of solving multivariate quadratic (MQ) systems of equations over finite fields. In the past two decades ...
    • Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research 

      Vestad, Arnstein; Yang, Bian (Chapter; Conference object, 2023)
      Municipalities are tasked with ensuring the cybersecurity of critical public services and functions in diverse areas such as safe water supply, healthcare, child protective services, and education with vastly different ...