• A Netnographic Study on the Dark Net Ecosystem for Ransomware 

      Bayoumy, Yara; Meland, Per Håkon; Sindre, Guttorm (Chapter, 2018)
      For more than a decade, businesses and private citizens alike have been tormented by an online phenomenon that has changed our stance on cyber security. Ransomware, malicious software that demands payment in exchange for ...
    • A Systematic Mapping Study on Requirements Engineering in Software Ecosystems 

      Vegendla, Aparna; Nguyen Duc, Anh; Gao, Shang; Sindre, Guttorm (Journal article; Peer reviewed, 2018)
      Software ecosystems (SECOs) and open innovation processes have been claimed as a way forward for the software industry. A proper understanding of requirements is as important for SECOs as for more traditional ones. This ...
    • A Tool-based Semantic Framework for Security Requirements Specification 

      Daramola, Olawande; Sindre, Guttorm; Moser, Thomas (Journal article; Peer reviewed, 2013)
      Attaining high quality in security requirements specification requires first-rate professional expertise, which is scarce. In fact, most organisations do not include core security experts in their software team. This ...
    • Adapting Requirements Specification Techniques for Mobile Information Systems 

      Gopalakrishnan, Sundar (Doctoral theses at NTNU;2017:171, Doctoral thesis, 2017)
      Mobile Information Systems technologies provide capabilities for using/handling information on the move and the motto has become anytime and anywhere computing. Thus, mobility-related requirements have become vital, but ...
    • Agile Security Requirements: A master study into their application 

      Knudsen, Anders Nordli (Master thesis, 2014)
      Agile is the contemporary development practice of choice but security has been claimed as a challenge for it. This thesis investigates whether agile methods can be used for security-critical software and if the reason why ...
    • An analysis of student app ideas for improving university education 

      Sindre, Guttorm (Journal article; Peer reviewed, 2017)
      In the course TDT4140 Software Engineering at NTNU in 2017 students worked in groups of 4 to propose ideas and make limited prototypes for software apps that could revolutionize university education. This paper analyses ...
    • An Application Security Assessment of Popular Free Android Applications 

      Håland, Christian (Master thesis, 2013)
      The number of applications for the Android platform found on Google Play is now over 1 million and there are over 1.5 billion downloads each month . With a low cost of entry the Android platform attracts developers many ...
    • An experimental evaluation of bow-tie analysis for cybersecurity requirements 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Bow-tie analysis includes a graphical representation for depicting threats and consequences related to unwanted events, and shows how preventive and reactive barriers can provide control over such situations. This kind of ...
    • An experimental evaluation of bow-tie analysis for security 

      Meland, Per Håkon; Bernsmed, Karin; Frøystad, Christian; Li, Jingyue; Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Purpose Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing digitalisation and coupling between ...
    • Analyse av oppgaver og oppgavesjangre i en digital eksamen i innledende programmering 

      Sindre, Guttorm (Journal article; Peer reviewed, 2019)
      Et viktig mål for samstemt undervisning er at læringsaktiviteter i løpet av semesteret og vurderingen etterpå skal stemme best mulig overens med intenderte læringsutbytter i emnet. Utfordringen for eksamen er at den har ...
    • Analyse av studenters eksamenskode: typiske feil og muligheter for autoretting 

      Sindre, Guttorm (Peer reviewed; Journal article, 2020)
      Selv om programkode egner seg for automatisk prosessering, har den typisk vært vurdert manuelt, også etter innføring av digital eksamen. Vanlige verktøy for digital eksamen har ikke tilbudt oppgavetyper hvor studentene kan ...
    • Analysis of security threats, requirements, and technologies in e-exam systems 

      Chirumamilla, Aparna (Doctoral theses at NTNU;2021:301, Doctoral thesis, 2021)
      Research context: The higher education (HE) sector is currently going through massive digital transformation by leveraging the use of technology to provide flexibility in teaching and learning. Increasing the usage of ...
    • Assessing cyber threats for storyless systems 

      Meland, Per Håkon; Nesheim, Dag Atle; Bernsmed, Karin; Sindre, Guttorm (Peer reviewed; Journal article, 2021)
      A proper assessment of potential cyber threats is vital for security decision-making. This becomes an even more challenging task when dealing with new system designs and industry sectors where there is little or no historical ...
    • Assessment and feedback across various outcomes in project-courses: A department-wide study 

      Hansen, Gabrielle; Sindre, Guttorm (Peer reviewed; Journal article, 2023)
      Project-based learning plays a central part in many study programs in technology and engineering and have demonstrated success both in motivating students and promoting effective learning both of technical engineering ...
    • Automated generation of variant programming tasks using large language models 

      Mæland, Jens; Sæther, Jonas (Master thesis, 2023)
      Programmering har utelukkende økt i populartitet siden det oppstod. Flere og flere studenter melder seg på introduksjonskurs i programmering, noe som fører til en dramatisk økning i ressursbehovet fra fakulter for å sikre ...
    • AUTOMATED MITIGATION OF CHEATING THREATS FOR REMOTE EXAMS 

      Græsdal-Knutrud, Lars Erik (Master thesis, 2017)
      Distance education often relies on remote testing to evaluate the performance of students. In many cases, these evaluations are unproctored and leave the evaluation prone to exploitation for those willing to cheat. With ...
    • Automatic question generation for JavaScript programming courses 

      Evje, Kjerand (Master thesis, 2023)
      Ettersom utdanningssystemet har blitt stadig mer digitalisert og automatisert, har prosessen med å lage og vurdere oppgaver stort sett forblitt den samme. Lærere bruker verdifull tid og ressurser på å lage og vurdere ...
    • Automatic self-evaluation system for novice Python developers 

      Nygård, Sindre Haneset (Master thesis, 2016)
      Students who enroll in university introductory programming courses often have very different backgrounds. Some have never written a single line of code in their entire life, while others have been programming for years. ...
    • Breaking the Cyber Kill Chain by Modelling Resource Costs 

      Haga, Kristian; Meland, Per Håkon; Sindre, Guttorm (Chapter, 2020)
      To combat cybercrime, a clearer understanding of the attacks and the offenders is necessary. When there is little available data about attack incidents, which is usually the case for new technology, one can make estimations ...
    • Breaking the Cyber Kill Chain by Modelling Resource Costs 

      Haga, Kristian (Master thesis, 2020)
      Denne oppgaven presenterer Resource Cost Model (RCM) - Ressurs Kost Model - en modelleringsteknikk for å estimere kostnadene av å gjennomføre et cyberangrep. Kostnaden estimeres fra de nødvendige ressursene til angrepet. ...