Now showing items 21-40 of 44

    • Hybrid IoT Cyber Range 

      Balto, Karl Edvard (Master thesis, 2022)
      Bruken av IoT enheter har økt kraftig de siste årene, utviklingen av nye enheter går fort, prisene presses og dermed må også kostnadene reduseres. IoT enheter får flere og flere oppgaver der det blir mer kritisk at enhetene ...
    • Hybrid IoT Cyber Range 

      Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)
      The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ...
    • Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics 

      Yamin, Muhammad Mudassar; Katt, Basel; Sattar, Kashif; Bin Ahmed, Maaz (Journal article; Peer reviewed, 2019)
      An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information ...
    • Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security 

      Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel; Hijji, Mohammad; Muhammad, Khan (Peer reviewed; Journal article, 2022)
      Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily ...
    • Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges 

      Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2022)
      The skill shortage in global cybersecurity is a well-known problem; to overcome this issue, cyber ranges have been developed. These ranges provide a platform for conducting cybersecurity exercises; however, conducting such ...
    • Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges 

      Yamin, Muhammad Mudassar (Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)
      Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ...
    • Multi-site Federation For Cyber Range 

      Dua, Simranjeet (Master thesis, 2023)
      Organisasjoner eier vanligvis en viss kapital i infrastruktur fordelt på flere tippesider. En grunnleggende utfordring ligger imidlertid i å optimalisere delingen og utnyttelse av eksisterende infrastruktur og riktig ...
    • Ontology-Based Scenario Modeling for Cyber Security Exercise 

      Wen, Shao-Fang; Yamin, Muhammad Mudassar; Katt, Basel (Chapter, 2021)
      The growing demand for cyber security professionals with practical knowledge is boosting the development and conduct of cyber security exercises around the world. Scenarios stand a central position of the exercise, which ...
    • A quantitative framework for security assurance evaluation and selection of cloud services: a case study 

      Shukla, Ankur; Katt, Basel; Yamin, Muhammad Mudassar (Journal article; Peer reviewed, 2023)
      Due to the high adoption of cloud services, the protection of data and information is critical. Cloud service customers (CSCs) need help to obtain the authoritative assurances required for the cloud services and negotiate ...
    • Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security 

      Hashmi, Ehtesham; Yamin, Muhammad Mudassar; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2024)
      This survey paper explores the transformative role of Artificial Intelligence (AI) in information security. Traditional methods, especially rule-based approaches, faced significant challenges in protecting sensitive data ...
    • Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study 

      Yamin, Muhammad Mudassar; Katt, Basel; Torseth, Espen (Peer reviewed; Journal article, 2021)
      With the increasing popularization of cybersecurity concepts due to ever increasing cybersecurity incidents, it is no secret that countries worldwide are investing heavily in cybersecurity education to build the necessary ...
    • Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study 

      Yamin, Muhammad Mudassar; Torseth, Espen; Laszlo, Erdodi; Katt, Basel (Peer reviewed; Journal article, 2022)
      Cyber security is a big challenge nowadays. However, the lack of qualified individuals and awareness is making the current situation more problematic. One way to address this problem is through National cyber security ...
    • A Self-Supervised Diffusion Framework For Facial Emotion Recognition 

      Hassan, Saif; Ullah, Mohib; Imran, Ali Shariq; Mujtaba, Ghulam; Yamin, Muhammad Mudassar; Hashmi, Ehtesham; Cheikh, Faouzi Alaya; Beghdadi, Azeddine Boutkhil (Proceedings of IEEE International Conference on Image Processing;, Chapter, 2024)
    • Self-supervised hate speech detection in Norwegian texts with lexical and semantic augmentations 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Yamin, Muhammad Mudassar; Abomhara, Mohamed Ali Saleh; Ullah, Mohib (Journal article; Peer reviewed, 2025)
      The proliferation of social media platforms has significantly contributed to the spread of hate speech, targeting individuals based on race, gender, impaired functioning, religion, or sexual orientation. Online hate speech ...
    • Sentinel Droid: A Machine Learning model to classify android Malware, and possible LLM use cases. 

      Singh, Ranvir (Master thesis, 2024)
      Android har lenge vært viktige innen operativsystemer. Dette skyldes delvis operativsystemets tilgjengelig kildekode. Selv om dette har ført til økt bruk av operativsystemet, finnes det en betydelig mengde skadelig programvare ...
    • Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises 

      Yamin, Muhammad Mudassar; Katt, Basel; Nowostawski, Mariusz (Peer reviewed; Journal article, 2021)
      Technology is evolving rapidly; this poses a problem for security specialists and average citizens as their technological skill sets are quickly made obsolete. This makes the knowledge and understanding of cyber-security ...
    • Smart Policing for a Smart World Opportunities, Challenges and Way Forward 

      Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2020)
      Our world is getting evolved to smart world day by day. This smart world is being developed to make people life easier through the data generated by the smart devices. Data is the fuel that powers the smart world evolution, ...
    • SMT: Self-supervised Approach for Multiple Animal Detection and Tracking 

      Moosa, Muhammad; Yamin, Muhammad Mudassar; Hashmi, Ehtesham; Beghdadi, Azeddine; Imran, Ali Shariq; Alaya Cheikh, Faouzi; Ullah, Mohib (IFIP Advances in Information and Communication Technology;, Chapter, 2024)
      In the domain of animal farming and wildlife management, monitoring animal behavior and movement is crucial. This paper proposes an efficient online multi-object tracking framework named SMT (Self-supervised Multi-animal ...
    • Toward AI-Based Scenario Management for Cyber Range Training 

      Hannay, Jo Erskine; Stolpe, Audun; Yamin, Muhammad Mudassar (Chapter, 2021)
      There is an immediate need for a greater number of highly skilled cybersecurity personnel to meet intensified cyber attacks. We propose a cyber range exercise management architecture that employs machine reasoning to ...
    • UI0T-FMT: Universal format for collection and aggregation of data from smart devices 

      Seljeseth, Mats Didriksen (Master thesis, 2020)
      Informasjons teknologi (IT) har blitt et særdeles omfattende del av menneskets hverdag. Hverdagslige apparater og dingser har blitt mer integrert med Smart Teknologi, som gjør det enklere for individet å bruke de. Med andre ...