Institutt for informasjonssikkerhet og kommunikasjonsteknologi: Recent submissions
Now showing items 1-20 of 2626
-
Developing Long Short-Term Memory Mechanism and Dataset for Intrusion Detection in Critical Infrastructure by Simulation
(Master thesis, 2024)Beskyttelsen av kritisk infrastruktur er svært viktig for å kunne forsørge privatpersoner og bedrifter med essensielle ressurser. Dette kan være utfordrende grunnet det sensitive og komplekse Industrial Control System ... -
Deep learning solution for automatic audio copy move forgery detection
(Master thesis, 2024)Autentisiteten til lydopptak er viktig i kriminaltekniske undersøkelser ettersom digitale medier blir stadig mer utbredt. Denne masteroppgaven utforsker utviklingen av automatiserte løsninger for Audio Authenticity Analysis ... -
Mimicking the Student: A Feature-Based Approach for Detecting AI-Generated Texts and Verifying Authorship in Educational Settings
(Master thesis, 2024)Denne oppgaven undersøker hvordan avanserte språkmodeller basert på kunstig intelligens (KI) påvirker akademisk integritet, med fokus på kontraktsjuks. Etter hvert som AI-funksjonene i modeller som ChatGPT, Claude og Gemini ... -
Forensic triage of digital evidence from the Internet of Things
(Doctoral theses at NTNU;2024:342, Doctoral thesis, 2024)The Internet of Things (IoT) has long been a popular topic that has led to numerous commercial innovations and products in a wide range of fields. As the number of deployed IoT systems worldwide rises, these systems should ... -
Enhancing Multilingual Hate Speech Detection: From Language-Specific Insights to Cross-Linguistic Integration
(Journal article; Peer reviewed, 2024)The rise of social media has enabled individuals with biased perspectives to spread hate speech, directing it toward individuals based on characteristics such as race, gender, religion, or sexual orientation. Constructive ... -
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design
(Journal article; Peer reviewed, 2024)Privacy by Design (PbD) is a well-known concept that aims to provide a high level of protection for privacy throughout the entire life cycle of systems development. Despite the considerable attention from stakeholders such ... -
Fuzzing the ARM Cortex-M: A Survey
(Chapter, 2024)Security testing low-level connected devices such as Internet of Things (IoT) devices is difficult due to their limited memory, communication bandwidth, and processing power. As a result, traditional testing processes ... -
Long-Context LLMs: How Extended Context Length Is Utilized, And Its Potential For Refining Decompiled Code
(Master thesis, 2024)Som følgje av store sprang i utviklinga av store språkmodellar og deira imponerande evner innan kodeforståing, har kybersikkerheitsfeltet byrja å inkludere generativ Kunstig Intelligens (KI) i deira arbeidsprosessar. Innan ... -
Modelling and Preserving Privacy in Online Social Networks
(Doctoral theses at NTNU;2024:348, Doctoral thesis, 2024)In the digital age, online social networks (OSNs) have become essential platforms for communication, information sharing, and social interaction. However, this widespread use has introduced significant privacy concerns. ... -
A BERT-Based Approach to Norwegian Disinformation Detection, and the Effect of Automation Bias in Content Moderation
(Master thesis, 2024)Desinformasjon utvikler seg hele tiden, og det kan være en utfordring å skille fakta fra fiksjon på sosiale medier. Forskning på automatisert deteksjon av norsk desinformasjon er i en tidlig fase, og denne oppgaven tar ... -
A BERT-Based Approach to Norwegian Disinformation Detection, and the Effect of Automation Bias in Content Moderation
(Master thesis, 2024)Desinformasjon utvikler seg hele tiden, og det kan være en utfordring å skille fakta fra fiksjon på sosiale medier. Forskning på automatisert deteksjon av norsk desinformasjon er i en tidlig fase, og denne oppgaven tar ... -
A survey of agent-based modeling for cybersecurity
(Chapter, 2024) -
Performance optimization for hybrid TS/PS SWIPT UAV in cooperative NOMA IoT networks
(Journal article; Peer reviewed, 2024)This study examines a cooperative non-orthogonal multiple access (NOMA) network utilizing an energy-constrained unmanned aerial vehicle (UAV) relay (UAVR) to expand coverage and improve network throughput. In order to ... -
Vineyard Leaf Disease Prediction: Bridging the Gap between Predictive Accuracy and Interpretability
(Advances in Intelligent Systems and Computing;, Chapter, 2024)This study is a part of "VIPA-DELF" sub-project and has indirectly received funding from the European Union's Horizon Europe research and innovation action programme, via the CHAMELEON Open Call#1 issued and executed under ... -
Attack Path Analysis of Satellites Connected to Critical Infrastructure
(Master thesis, 2024)The increasing integration of satellite technology in critical infrastructures introduces a new attack surface to disrupt vital societal functions. This master’s thesis aims to investigate the cybersecurity vulnerabilities ... -
Synthesis of a Conceptual Architecture for Cognitive IoT Device Management
(Doctoral theses at NTNU;2024:349, Doctoral thesis, 2024)The Internet of Things (IoT) is characterised by diverse, dynamic and distributed deployments of sensors, actuators, tools and gadgets. These devices often have limited resources like energy, memory, and processing power. ... -
Supersingular Endomorphism Rings: Algorithms and Applications
(Doctoral theses at NTNU;2024:303, Doctoral thesis, 2024)This thesis is about the endomorphism rings of supersingular elliptic curves, their applications in cryptography, and related algorithms. These algorithms and applications all involve an interplay between supersingular ... -
A Quantitative Security Assurance Framework for Large Language Model Applications
(Master thesis, 2024)Store språkmodeller har etablert seg som transformative verktøy for et bredt spekter av oppgaver. Bruken av dem er imidlertid holdt tilbake av deres ukjente sikkerhetsaspekter, og er til hinder for å fullt kunne utnytte ... -
A Framework for Benchmarking a Private 5G Network Exemplified with Industry 4.0 Use Cases
(Master thesis, 2024)5G er tenkt å imøtekomme flere heterogene bruksområder, alt fra forsinkelsessensitive applikasjoner basert på URLLC, båndbreddeintensive applikasjoner basert på eMBB, til energibesparende applikasjoner basert på mMTC. Disse ...