• Cyber security education for children through gamification: research plan and perspectives 

      Quayyum, Farzana (Chapter, 2020)
      With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, ...
    • Cyber security handling in manufacturing plants 

      Endresen, Sander (Master thesis, 2022)
      Purdue-modellen er en nivådelt modell for nettverkstopologi som brukes for å skille IT-nettverk og OT-nettverk i industrielle anlegg. IT-delen av Purdue-modellen er kontorlaget og OT-delen består av nivåene drift, kontroll, ...
    • Cyber Security in Smart Meters: Vulnerability Investigation in the Home Area Network Port 

      Fredriksen, Isa Agnete Halmøy (Master thesis, 2018)
      As a part of a modernized electric power system, mechanical electricity meters are being exchanged with smart meters. The smart meters are to be equipped with a communication interface that customers may use to get a better ...
    • Cyber Security in the Cellular Internet of Things 

      Hyndøy, Henrik (Master thesis, 2022)
      Med inntoget av mobilteknologier som 4G og 5G har telekommunikasjonsnettverk blitt et attraktivt operatøralternativ for Internet of Things (IoT). Nettene tilbyr sikkerhet implementert av mobiloperatørene, en distribuert ...
    • Cyber Security Issues in Navigation Systems of Marine Vessels From Control Perspective 

      Hassani, Vahid; Crasta, Naveena; Pascoal, Antonio (Chapter, 2017)
      Autonomous marine vessels are the way forward to revolutionize maritime operations. However, the safety and success of autonomous missions depend critically on the availability of a reliable positioning system and time ...
    • CYBER SECURITY OF SAFETY INSTRUMENTED SYSTEMS 

      Adeyemi, Temilola Titilayo (Master thesis, 2023)
      Cybersikkerhet for sikkerhetsinstrumenterte systemer tar sikte på å tilby et rammeverk for å adressere en sikker ved design, strategi for å beskytte og sikre tilgjengeligheten til industriell automatisering og kontroll- ...
    • Cyber security risk assessment of a DDoS attack 

      Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V (Journal article; Peer reviewed, 2016)
      This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ...
    • Cyber Security Risk Assessment Practices: Core Unified Risk Framework 

      Wangen, Gaute Bjørklund (Doctoral theses at NTNU;2017:153, Doctoral thesis, 2017)
      We conduct risk assessments to reducing the uncertainty regarding future events in order to make the best decisions possible and to control risk. In industry, the aim is to find the appropriate balance in risk-taking ...
    • Cyber security testbed provisioning using a domain specific language 

      Dunfjeld, Mihkal (Master thesis, 2019)
      Praktiske oppgaver i ett virtualisert testmiljø er en effektiv metode for studenter å lære cybersikkerhet. For å kunne sette opp slike testmiljøer er en avhengig av kunnskap, tid og ressurser siden dette er en komplisert ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber Situational Security Awareness Architecture (CSSA) for Industrial Control Systems 

      Hellesen, Niclas (Master thesis, 2019)
      Dette prosjektet legger grunnlaget for en cyber sikkerhets situasjonell forståelses arkitektur for industrielle kontrollsystemer. Videre svarer den på forsknings spørsmål om resultater og kontekst for penetrasjonstesting ...
    • Cyber Threat Information Requirements for Strategic Decision-Making 

      Tinde, Tiril Ligaya (Master thesis, 2022)
      I en cybertrusselsituasjon må informasjon utveksles på tvers av disiplinære og organisatoriske grenser for å støtte beslutningstakere på alle nivåer. Denne informasjonsutvekslingen er preget av teknisk kompleksitet og skjer ...
    • Cyber Threats and Vulnerabilities in the Integrated Navigation System 

      Ruud, Ulrik Johansen (Master thesis, 2022)
      Det Integrerte Navigasjonssystemet (INS) er et viktig system i et maritimt fartøy. Det sørger for sikker navigering mens man er på havet. INS består av mange forskjellige typer enheter som hjelper til dette. Målet med denne ...
    • Cyber Trust in the Norwegian Online Flea Market: An Ethnographic Study on Fraud 

      Pan, Yushan (Chapter, 2020)
      This work-in-progress paper reports an ethnographic study on how cyber trust could be designed to prevent online fraud. A yearlong ethnographic study was conducted with a group of victims who were scammed in online shopping. ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cyber-conformity and safety: the groupthink dilemma 

      Størseth, Fred (Journal article; Peer reviewed, 2017)
      The 'capable group' is part of the ethos in resilience-based safety management. Group ideas draw upon psychology. But, what if the psychological blueprints no longer apply? My thesis is that we are changed by cyber-conformity: ...
    • Cyber-insurance & endogenous network formation 

      Halse, Håvard Råmundal; Hoemsnes, Jonas (Master thesis, 2013)
      Cyber-insurance is a powerful economic concept that can help companies in a world where cybercrime exist. From the early 80s, several researchers claimed that cyber-insurance had a bright future, and could become an important ...
    • Cyber-physical Hardening of the DigitalWater Infrastructure 

      Cali, Umit; Catak, Ferhat Özgur; Balogh, Zsolt György; Ugarelli, Rita Maria; Jaatun, Martin Gilje (Chapter, 2023)
      Water supply and drainage systems, which are categorized as critical infrastructure, serve a crucial role in preserving societal health and well-being. Since climate change effects, harsher regulations, population changes, ...
    • Cyber-Physical Systems in Libraries 

      Thushyanthan, Purusoth (Master thesis, 2023)
      Formålet med denne oppgaven er å utforske kunnskapsgapet mellom biblioteksektoren og muligheter innen digitalisering. Mer spesifikt tar denne avhandlingen stilling til bruken av dataintegrerte produksjonssystemer eller ...