Institutt for informasjonssikkerhet og kommunikasjonsteknologi: Recent submissions
Now showing items 1-20 of 2517
-
HEBI: Homomorphically Encrypted Biometric Indexing
(Chapter, 2023)Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ... -
Type^2: A Secure and Seamless Biometric Two-Factor Authentication Protocol Using Key stroke Dynamics
(Peer reviewed; Journal article, 2023) -
On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations
(Peer reviewed; Journal article, 2023)Protecting minutiae-based fingerprint templates with fully homomorphic encryption has recently been recognised as a hard problem. In this work, we evaluate state-of-the-art fingerprint recognition based on minutiae templates ... -
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
(Peer reviewed; Journal article, 2023)Reliable authentication of individuals is the foundation of trusted digital interaction. Biometrics lend themselves ideally to this goal. However, biometric data must be protected under computation according to European ... -
Maritime Decision-makers and cybersecurity: Deck officers' perception of cyber risks towards IT and OT systems
(Journal article; Peer reviewed, 2024)Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes to substantiate the importance of considering human behaviour within ... -
Software Bill of Materials in Critical Infrastructure
(Chapter, 2023)Critical infrastructure today is comprised of cyber-physical systems, and therefore also vulnerable to cyber threats. Many of these threats come from within, through malicious code in software updates or bugs that can be ... -
Exploring Digital Forensic Readiness: A Preliminary Study from a Law Enforcement Perspective
(Peer reviewed; Journal article, 2023)In today’s world of cybersecurity, it is not a question of whether an organization will experience a cyber attack, but rather a matter of when it will happen. These incidents can cause significant disruption and financial ... -
CybAllaince WP3 Report Joint Supervision, and Guest Tutorials Report 2023
(Research report, 2023) -
Promoting Learners’ Engagement to Maximize Learning in a Synchronous Online Workshop: A Case Study Analysis from Different Perspectives
(Chapter, 2023)As cloud computing becomes increasingly popular, the need for professionals with cyber security expertise for cloud platforms has become crucial. Continuous education initiatives are vital for ensuring that professionals ... -
Morph-PIPE: Plugging in Identity Prior to Enhance Face Morphing Attack Based on Diffusion Model
(Journal article, 2023) -
CybAllaince WP3 Course Material Preparation Report 2023
(Research report, 2023) -
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Peer reviewed; Journal article, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Rethinking Independence in Safety Systems
(Chapter, 2024)The independence in safety systems ensures that the rest of the OT system possesses the ability to resume normal operation or revert to a safe state during a failure. The requirement was previously sustained by isolating ... -
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Journal article; Peer reviewed, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Analyzing Amazon Products Sentiment: A Comparative Study of Machine and Deep Learning, and Transformer-Based Techniques
(Journal article; Peer reviewed, 2024)In recent years, online shopping has surged in popularity, with customer reviews becoming a crucial aspect of the decision-making process. Reviews not only help potential customers make informed choices, but also provide ... -
A Call for Mandatory Input Validation and Fuzz Testing
(Journal article; Peer reviewed, 2023)The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and ... -
BRAKE: Biometric Resilient Authenticated Key Exchange
(Journal article; Peer reviewed, 2024)Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared ... -
Case study analysis: Insider incidents at Volvo, Scania, Den Norske Veritas (DNV), the Swedish Security Service (SÄPO) and the Swedish Military Intelligence
(Master thesis, 2023)Denne oppgaven omhandler innsidetrusselen relatert til statlige aktører som rekrutterer mennesker, til innhenting av informasjon som ellers ikke hadde vært tilgjengelig. Denne angrepsvektoren er godt beskrevet og gjort ... -
Towards a Methodology to Assess Quality of 5G Slicing
(Master thesis, 2023)Skivedeling av nettverk muliggjøre at flere tjenester og applikasjoner med ulike ytelseskrav kan operere parallelt på en delt nettverksinfrastruktur. Ved å benytte programvaredefinert nettverk (SDN) og nettverksfunksjons ... -
Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives
(Chapter, 2024)This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ...