• A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A General Formalism for Defining and Detecting OpenFlow Rule Anomalies 

      Aryan, Ramtin; Yazidi, Anis; Engelstad, Paal E.; Kure, Øivind (Chapter, 2017)
      SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ...
    • A Privacy-enhanced Reputation System for Mobile Ad hoc Services 

      Chen, Yu (Master thesis, 2010)
      MANET has been widely used for distributed communications. Various services can be developed based on MANET. However, lack of trust retards the success of many MANET based services (i.e., MANET services). This thesis work ...
    • A Survey of QoS Multicast in Ad Hoc Networks 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (Journal article; Peer reviewed, 2010-09-14)
      This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. ...
    • Academic Dissemination and Exploitation of a Clean-slate Internetworking Architecture:: The Publish-Subscribe Internet Routing Paradigm 

      Ain, Mark (Master thesis, 2010)
      This thesis is about disseminating and exploiting a clean-slate internetworking architecture through advanced academic courses. We design, execute, and report on the results of an academic course-based engagement and ...
    • An Investigation of Spam Filter Optimaltiy: based on Signal Detection Theory 

      Singh, Kuldeep (Master thesis, 2009)
      Unsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) ...
    • Brukersikkerhet i spillindustrien 

      Lindseth, Jarle (Master thesis, 2010)
      Oppgaven starter med en gjennomgang av spillindustriens og hvordan dens utvikling har økt behovet for fokus på brukerautentisering, hvordan den kan sammenliknes med andre industrier og hvordan den skiller seg fra dem. Den ...
    • Capacity of Mobile Ad Hoc Networks Using an Airborne Relay 

      Solbakken, Kristian Buhaug (Master thesis, 2016)
      Self-organizing wireless networks is an interesting technology with a potential of providing robust communication in environments without existing infrastructure and a minimum of configuration. Such features seem especially ...
    • Congestion Control  for Delay Sensitive Unicast Multimedia Applications  in Datagram Networks 

      Libæk, Bjørnar (Doctoral Theses at NTNU, 1503-8181; 2013:321, Doctoral thesis, 2013)
      This thesis emphasizes the need for congestion control mechanisms for multimedia flows requiring both low jitter and low end-to-end delays. Such mechanisms must not only satisfy the user in terms of high Quality of Experience ...
    • Content Distribution in Ad Hoc Networks 

      Johnsen, Lotte (Master thesis, 2006)
      Multicast is used to send data to many receivers simultaneously. Multicast protocols developed for wired networks are not suitable for a Mobile Ad Hoc Network (MANET), mainly because the mobile nodes create a changing ...
    • Energy Efficiency of Streaming over Mobile Ad-hoc Networks 

      Pattabiraman, Prashanth (Master thesis, 2010)
      Hand held mobile devices are widely used today primarily due to their rich functionality and the ease of portability. However, the battery life of these devices is very limited and deploying resource hungry applications ...
    • Enhancing security attacks analysis using regularized machine learning techniques 

      Hagos, Desta Haileselassie; Yazidi, Anis; Kure, Øivind; Engelstad, Paal E. (Journal article; Peer reviewed, 2017)
      With the increasing threats of security attacks, Machine learning (ML) has become a popular technique to detect those attacks. However, most of the ML approaches are black-box methods and their inner-workings are difficult ...
    • Experimental validation of a new impedance based protection for networks with distributed generation using co-simulation test platform 

      Pandakov, Konstantin; Adrah, Charles Mawutor; Hoidalen, Hans Kristian; Kure, Øivind (Peer reviewed; Journal article, 2019)
      Combined real-time hardware-in-the-loop simulations and modeling of communication networks (co-simulation platforms) is a powerful test-bed for development and validation of relay protection schemes utilizing communication ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (Journal article; Peer reviewed, 2018)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ...
    • Hardware-in-the-loop testing of impedance protection with compensation of fault impedance and DG infeed current 

      Pandakov, Konstantin; Adrah, Charles Mawutor; Liu, Zhou; Hoidalen, Hans Kristian; Kure, Øivind (Journal article; Peer reviewed, 2018)
      The standard impedance protection deployed in distribution networks can malfunction due to underreach errors caused by fault impedances and remote infeed currents from embedded generators (becoming more and more widespread). ...
    • Identity Management with Petname Systems 

      Ferdous, Md. Sadek (Master thesis, 2009)
      In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ...
    • Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering 

      Flathagen, Joakim; Drugan, Ovidiu Valentin; Engelstad, Paal Einar; Kure, Øivind (Journal article; Peer reviewed, 2011)
      Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–betweenness community detection algorithm to determine ...
    • Interdomain Multicast - Robust multikast videresending mellom mobile ad-hoc - og kablede nettverk. 

      Dehli, Simon (Master thesis, 2016)
      Det finnes mange multikastruteprotokoller for Mobile Ad-hoc Nettverk (MANET) som for eksempel Simplified Multicast Forwarding (SMF), Multicast Ad-Hoc On-Demand Distance Vector (MAODV) og Multicast Optimized Link State ...
    • Investigation of LTE Privacy Attacks by Exploiting the Paging Mechanism 

      Zhou, Shelley Xianyu (Master thesis, 2018)
      In mobile communication in general, and LTE in particular, security should be a main focus, also because of the vulnerabilities introduced by the radio link. Compared to GSM and UMTS, the LTE security has been improved. ...
    • LogWheels: A Security Log Visualizer 

      Egeland, Vegard (Master thesis, 2011)
      Logging security incidents is a required security measure in every moderately complex computer system. But while most systems produce large quantities of textual logs, these logs are often neglected or infrequently monitored ...