Institutt for informasjonssikkerhet og kommunikasjonsteknologi
Nye registreringer
-
Automatically Detecting Political Viewpoints in Norwegian Text
(Journal article, 2024)We introduce three resources to support research on political texts in Scandinavia. The encoder-decoder transformer models sp-t5 and sp-t5-keyword were trained on political texts. The nor-pvi (available at https://tinyur ... -
Augmenting sentiment prediction capabilities for code-mixed tweets with multilingual transformers
(Journal article; Peer reviewed, 2024)People in the modern digital era are increasingly embracing social media platforms to express their concerns and emotions in the form of reviews or comments. While positive interactions within diverse communities can ... -
Opportunities of Insecurity Refactoring for Training and Software Development
(Doctoral theses at NTNU;2024:106, Doctoral thesis, 2024)Teaching software security is complex and should involve practical exercises. Practical exercises require software artifacts and projects that contain vulnerabilities. The vulnerabilities can be exploited to understand ... -
Do you have any privacy? Human activity privacy leak from wearable devices
(Master thesis, 2023)Dette prosjektet viser gjennom et simulert scenario hvordan personlig informasjon kan lekkes til en utenforstående person med uhederlige hensikter fra helse og aktivitetssensorer. Metoden som brukes i prosjektet er å ... -
HEBI: Homomorphically Encrypted Biometric Indexing
(Chapter, 2023)Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ... -
Type^2: A Secure and Seamless Biometric Two-Factor Authentication Protocol Using Key stroke Dynamics
(Peer reviewed; Journal article, 2023) -
On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint Representations
(Peer reviewed; Journal article, 2023)Protecting minutiae-based fingerprint templates with fully homomorphic encryption has recently been recognised as a hard problem. In this work, we evaluate state-of-the-art fingerprint recognition based on minutiae templates ... -
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
(Peer reviewed; Journal article, 2023)Reliable authentication of individuals is the foundation of trusted digital interaction. Biometrics lend themselves ideally to this goal. However, biometric data must be protected under computation according to European ... -
Maritime Decision-makers and cybersecurity: Deck officers' perception of cyber risks towards IT and OT systems
(Journal article; Peer reviewed, 2024)Through a quantitative study of deck officers’ cyber risk perceptions towards information (IT) and operational (OT) systems, this paper contributes to substantiate the importance of considering human behaviour within ... -
Software Bill of Materials in Critical Infrastructure
(Chapter, 2023)Critical infrastructure today is comprised of cyber-physical systems, and therefore also vulnerable to cyber threats. Many of these threats come from within, through malicious code in software updates or bugs that can be ... -
Exploring Digital Forensic Readiness: A Preliminary Study from a Law Enforcement Perspective
(Peer reviewed; Journal article, 2023)In today’s world of cybersecurity, it is not a question of whether an organization will experience a cyber attack, but rather a matter of when it will happen. These incidents can cause significant disruption and financial ... -
CybAllaince WP3 Report Joint Supervision, and Guest Tutorials Report 2023
(Research report, 2023) -
Promoting Learners’ Engagement to Maximize Learning in a Synchronous Online Workshop: A Case Study Analysis from Different Perspectives
(Chapter, 2023)As cloud computing becomes increasingly popular, the need for professionals with cyber security expertise for cloud platforms has become crucial. Continuous education initiatives are vital for ensuring that professionals ... -
Morph-PIPE: Plugging in Identity Prior to Enhance Face Morphing Attack Based on Diffusion Model
(Journal article, 2023) -
CybAllaince WP3 Course Material Preparation Report 2023
(Research report, 2023) -
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Peer reviewed; Journal article, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Rethinking Independence in Safety Systems
(Chapter, 2024)The independence in safety systems ensures that the rest of the OT system possesses the ability to resume normal operation or revert to a safe state during a failure. The requirement was previously sustained by isolating ... -
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Journal article; Peer reviewed, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Analyzing Amazon Products Sentiment: A Comparative Study of Machine and Deep Learning, and Transformer-Based Techniques
(Journal article; Peer reviewed, 2024)In recent years, online shopping has surged in popularity, with customer reviews becoming a crucial aspect of the decision-making process. Reviews not only help potential customers make informed choices, but also provide ... -
A Call for Mandatory Input Validation and Fuzz Testing
(Journal article; Peer reviewed, 2023)The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and ...