Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 1881-1900 of 2525
-
Risks and Quality Control in Norwegian Police’s Digital Forensics Process: The Digital Forensics Examiner’s Tightrope Walk
(Master thesis, 2023)Det har vært en økning i antall digitale sporkilder i den senere tid, og dette har satt digital kriminalteknikk under press. Faktorer som økende saksmengder og få spesialister har ført til at flere utøvere uten tilstrekkelig ... -
Robust algorithms for 2D and 3D Face Morphing Attacks: Generation and Detection
(Doctoral theses at NTNU;2024:202, Doctoral thesis, 2024)Biometric Authentication (Biometrics) is a powerful tool that authenticates individuals using digital means, which includes biological or behavioral characteristics. Biometrics harnesses biological features such as ... -
Robust Algorithms for Audio-Visual Biometric Authentication
(Doctoral theses at NTNU;2021:394, Doctoral thesis, 2021)Biometric authentication has been a vital method of human identification across a wide range of applications. It is a quick and secure authorization process in applications such as border control and banking transactions. ... -
Robust Algorithms For Face Morphing Attack Detection: Database, Vulnerability and Detection
(Doctoral theses at NTNU;2022:299, Doctoral thesis, 2022)Biometrics has emerged as a promising technology for automated recognition of individuals. The stored biometric characteristics are used to recognise an individual and hence biometrics technology plays a major role in ... -
Robust Biometric Verification Based On The Eye Region - Algorithms for Visible Spectrum Image Data
(Doctoral theses at NTNU;312, Doctoral thesis, 2016)Popular mobile banking and e-commerce applications like Google Wallet, Apple Pay and Alipay have resulted in using personal devices like smartphones for secure access of services via biometric data captured from embedded ... -
Robust Biometrics on Smartphones – Using Quality Assessment, Presentation Attack Detection, and Biometric Fusion
(Doctoral theses at NTNU;2019:131, Doctoral thesis, 2019)With the technological advancements in mobile technology, there is a massive adoption of biometrics as a security measure in today1s smartphones. Smartphones are used in all day to day activities such as online banking, ... -
A Robust Framework for Object Detection in a Traffic Surveillance System
(Peer reviewed; Journal article, 2022)Object recognition is the technique of specifying the location of various objects in images or videos. There exist numerous algorithms for the recognition of objects such as R-CNN, Fast R-CNN, Faster R-CNN, HOG, R-FCN, ... -
Robust Identification and Segmentation of the Outer Skin Layers in Volumetric Fingerprint Data
(Peer reviewed; Journal article, 2022)Despite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD). Currently available ... -
Robust Low-level ITS Architecture using OSGi, Reactive Blocks and OPC-UA
(Master thesis, 2014)The vehicle traffic flows on a daily basis, and it works. People get from A to B, sometimes using longer time than expected because of traffic or accidents. Transport vehicles arrive without a notice and valuable traffic ... -
Robustness in Wireless Network Access Protocols
(Doctoral Theses at NTNU, 1503-8181; 2012:230, Doctoral thesis, 2012)Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An ... -
Robustness of short-term load forecasting models for smart grids
(Master thesis, 2020)Spenningsnivåer er en viktig faktor i den daglige driften av distribusjonsnett. Nå som smartgridet i Norge begynner å vokse med flere og flere sensorer innstallert i nettet, er det mulig å samle inn store mengder data. ... -
RoLA: A Real-Time Online Lightweight Anomaly Detection System for Multivariate Time Series
(Chapter, 2023)Abstract: A multivariate time series refers to observations of two or more variables taken from a device or a system simultaneously over time. There is an increasing need to monitor multivariate time series and detect ... -
Role of Artificial Intelligence in Software Quality Assurance
(Peer reviewed; Journal article, 2021)Artificial intelligence has taken its place in almost every industry individual operate in, it has become integral part of applications and systems in our surrounding. The world quality report estimates that 64% of the ... -
The Role of Emotion Regulation for General Self-Efficacy in Adolescents Assessed Through Both Neurophysiological and Self-Reported Measures
(Peer reviewed; Journal article, 2023)Background: Self-efficacy, the belief in one’s ability and capacity to organize and execute actions required to achieve desired results, is associated with adolescent academic achievement and reduced risk for psychopathology. ... -
The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills
(Peer reviewed; Journal article, 2022)The emergence of synthetic media such as deep fakes is considered to be a disruptive technology shaping the fight against cybercrime as well as enabling political disinformation. Deep faked material exploits humans’ ... -
The Role of Theoretical Models in Ecologically Valid Studies: the example of a video Quality of Experience model
(Peer reviewed; Journal article, 2023)This paper discusses the problem of ecological va-lidity of Quality of Experience experiments in a broader context of internal and external validity. We argue that the issue of trade-off between control in the experiment ... -
The Root Causes of Compromised Accounts at the University
(Chapter, 2020)Compromised usernames and passwords are a continuous problem that several organizations struggle with even though this is a known problem with known solutions. Passwords remain a problem for the modern University as it ... -
Routing and load balancing in Internet of Things (IoT)
(Master thesis, 2009)The assignment includes the following tasks 1. Study the Telenor Connected Object (COOS) infrastructure 2. Study existing load balancing techniques that are relevant for COOS 3. Make a model of COOS in order to investigate ... -
Routing for a dark net overlay network
(Master thesis, 2023)Desentraliserte "peer-to-peer" - nettverk har utfordringer med å rute trafikk effektivt og nettverksstabilitet. Å sikre effektivitet og stabilitet i nettverket når man bruker Tor for anonymitet, utgjør ytterligere ... -
Routing over heterogeneous radio networks in mobile ad hoc networks
(Doktoravhandlinger ved NTNU, 1503-8181; 2009:154, Doctoral thesis, 2009)There will be a need to configure nodes with multiple radios, as ad hoc networks are being deployed. The applications tend to have high bandwidth requirements. At the same time, the deployment scenario may result in range ...