Browsing NTNU Open by Author "Franke, Katrin"
Now showing items 21-40 of 54
-
Digital Forensics Report for Dagens Næringsliv
Johnsen, Jan William; Franke, Katrin (Research report, 2018)Dagens Næringsliv (DN) approached the Norwegian University of Science and Technology (NTNU) to investigate whether some data manipulation had occurred in various log files in its possession. DN advised they are in the ... -
Digital investigation: The malnourished child in the Norwegian police family?
Heitmann, Odin (Master thesis, 2019)Vi lever i en digitalisert verden der teknologi er til stede i alle deler av våre daglige liv. I dag er digitale spor en naturlig del av de fleste straffesaker. Dette medfører at ansatte i politiet må ha et visst nivå med ... -
Ensuring quality of covert police work with Wi-Fi and Bluetooth technology
Sørenssen, Atle Malthe (Master thesis, 2021)Sikring og tolkning av artefakter fra digitale beslag er svært relevant for politiet. Artefakter fra trådløse signaler som sendes fra Bluetooth og Wi-Fi enheter brukes imidlertid i begrenset grad av politiet i dag, selv ... -
Evidence in the fog – Triage in fog computing systems
Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andre (Journal article; Peer reviewed, 2023)Fog computing promises improved service scalability and lower latency for IoT systems. The concept closes the gap between full computing capabilities at the network's edge and cloud systems' centrally located processing ... -
Exploring Digital Forensic Readiness: A Preliminary Study from a Law Enforcement Perspective
Heitmann, Odin; Franke, Katrin (Peer reviewed; Journal article, 2023)In today’s world of cybersecurity, it is not a question of whether an organization will experience a cyber attack, but rather a matter of when it will happen. These incidents can cause significant disruption and financial ... -
Extracting Cyber Threat Intelligence From Hacker Forums
Deliu, Isuf (Master thesis, 2017)The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive ... -
Fallacies when Evaluating Digital Evidence Among Prosecutors in the Norwegian Police Service
Erlandsen, Tom Erik (Master thesis, 2019)Digitale bevis har vært en naturlig del av bevisbildet i retten i flere år, men fortsatt ser det ut til at digitale bevis skaper usikkerhetsmomenter. Rettsvesenets manglende forståelse for digitale bevis kan potensielt ... -
Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2017)Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and ... -
Gathering Open Source Threat Intelligence from Twitter: An Integrated Supervised and Unsupervised Learning Approach
Kristiansen, Linn-Mari (Master thesis, 2020)Etterretning fra åpne kilder kan samles inn for mange formål, og innsamling av presis trusseletterretning fra åpne kilder kan være avgjørende når det kommer til effektiv håndtering av et cyberangrep. Spesifikke sårbarheter, ... -
Giving the Police a Head Start: Norwegian Named Entity Recognition Dataset and Model Development for Investigative Purposes
Ørke, Anne Mosvold (Master thesis, 2023)Nesten alle eier digitale enheter og digitale bevis har blitt en viktig del av etterfor- skninger. Den store mengden med digitale enheter og bevis som må undersøkes fører til et etterslep, som igjen kan føre til forsinkelser ... -
Hybrid analysis for Android malware family classification in a time-aware setting
Fauskrud, Joakim (Master thesis, 2019)Flere millioner ondsinnede Android applikasjoner (skadevare) detekteres hvert år. Disse applikasjonene skjuler seg i Android-markedsplasser ved utgi seg for å være godsinnede applikasjoner. Når en bruker installerer ... -
Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2018)Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ... -
Identifying Proficient Cybercriminals Through Text and Network Analysis
Johnsen, Jan William; Franke, Katrin (Chapter, 2020)A few highly skilled cybercriminals run the Crime as a Service business model. These expert hackers provide entry-level criminals with tools that allow them to enhance their cybercrime operations significantly. Thus, ... -
The impact of preprocessing in natural language for open source intelligence and criminal investigation
Johnsen, Jan William; Franke, Katrin (Journal article, 2019)Underground forums serves as gathering place for like-minded cyber criminals and are an continued threat to law and order. Law enforcement agencies can use Open-Source Intelligence (OSINT) to gather valuable information ... -
Legal and technical questions of file system reverse engineering
Stoykova, Radina; Nordvik, Rune; Ahmed, Munnazzar; Franke, Katrin; Axelsson, Stefan; Toolan, Fergus (Peer reviewed; Journal article, 2022)Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition, and correct interpretation of data structures by law enforcement in criminal investigations. This position paper examines ... -
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Shalaginov, Andrii; Banin, Sergii; Dehghantanha, Ali; Franke, Katrin (Chapter, 2018)Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections. The fast growth ... -
Malware detection and classification using low-level features
Banin, Sergii (Doctoral theses at NTNU;2023:11, Doctoral thesis, 2023)Nowadays, computers and computer systems are involved in most areas of our lives. Employees and users of manufacturing and transportation, banking and healthcare, education, and entertainment rely on computers and networks ... -
Malware detection through opcode sequence analysis using machine learning
Bragen, Simen Rune (Master thesis, 2015)To identify malware, most antivirus scanners use a combination of signature matching and heuristic-based detection. Signature matching compares only to previously known files, while heuristic-based detection looks for known ... -
Memory access patterns for malware detection
Banin, Sergii; Shalaginov, Andrii; Franke, Katrin (Journal article; Peer reviewed, 2016)Malware brings significant threats to modern digitized society. Malware developers put in significant efforts to evade detection and remain unnoticed on victims' computers despite a number of malware detection techniques. ... -
Mining Key-Hackers from Large Scale Hacker Forums
Reppen,Leif Marius Sethne (Master thesis, 2020)I dagens samfunn omfavner kriminelle mulighetene som internett tilbyr. Organiserte forbrytelser kan gjennomføres i stor skala på nettet, med bare noen få tastetrykk. Svært ofte uten mulighet til å rettsforfølge lovbryterne. ...