Now showing items 4400-4419 of 20194

    • Cyber security testbed provisioning using a domain specific language 

      Dunfjeld, Mihkal (Master thesis, 2019)
      Praktiske oppgaver i ett virtualisert testmiljø er en effektiv metode for studenter å lære cybersikkerhet. For å kunne sette opp slike testmiljøer er en avhengig av kunnskap, tid og ressurser siden dette er en komplisert ...
    • Cyber Security Training for Critical Infrastructure Protection: a Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2021)
      Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ...
    • Cyber Situational Security Awareness Architecture (CSSA) for Industrial Control Systems 

      Hellesen, Niclas (Master thesis, 2019)
      Dette prosjektet legger grunnlaget for en cyber sikkerhets situasjonell forståelses arkitektur for industrielle kontrollsystemer. Videre svarer den på forsknings spørsmål om resultater og kontekst for penetrasjonstesting ...
    • Cyber Threat Information Requirements for Strategic Decision-Making 

      Tinde, Tiril Ligaya (Master thesis, 2022)
      I en cybertrusselsituasjon må informasjon utveksles på tvers av disiplinære og organisatoriske grenser for å støtte beslutningstakere på alle nivåer. Denne informasjonsutvekslingen er preget av teknisk kompleksitet og skjer ...
    • Cyber Threats and Vulnerabilities in the Integrated Navigation System 

      Ruud, Ulrik Johansen (Master thesis, 2022)
      Det Integrerte Navigasjonssystemet (INS) er et viktig system i et maritimt fartøy. Det sørger for sikker navigering mens man er på havet. INS består av mange forskjellige typer enheter som hjelper til dette. Målet med denne ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Cyber-Attacks Against the Autonomous Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Chapter, 2019)
      Autonomous ships transferring valuable cargoes and humans in a more efficient and cost effective manner will soon be state of the art technology. Yet, their ICT system architecture and operations have not been defined in ...
    • Cyber-insurance & endogenous network formation 

      Halse, Håvard Råmundal; Hoemsnes, Jonas (Master thesis, 2013)
      Cyber-insurance is a powerful economic concept that can help companies in a world where cybercrime exist. From the early 80s, several researchers claimed that cyber-insurance had a bright future, and could become an important ...
    • Cyber-physical Hardening of the DigitalWater Infrastructure 

      Cali, Umit; Catak, Ferhat Özgur; Balogh, Zsolt György; Ugarelli, Rita Maria; Jaatun, Martin Gilje (Chapter, 2023)
      Water supply and drainage systems, which are categorized as critical infrastructure, serve a crucial role in preserving societal health and well-being. Since climate change effects, harsher regulations, population changes, ...
    • Cyber-resilient Aided Inertial Navigation: Applications to Ships and Unmanned Surface Vehicles 

      Volden, Øystein (Doctoral theses at NTNU;2023:15, Doctoral thesis, 2023)
      With the recent advancement in maritime autonomy, the autonomous ship market is predicted to cut costs through more efficient operation of uncrewed ships and surface vehicles, followed by a reduction in associated construction ...
    • Cyber-Security Assessment of Power System Digital Components in the Conditions of Hostilities 

      Mishchenko, Denys; Oleinikova, Irina; Ivanko, Dmytro (Chapter, 2023)
      Emergencies, including hostilities, create additional cyber-physical security (CPS) challenges for the operation of digital power system components. This paper showcases the main problems faced by one of the components of ...
    • Cyber-Security Gaps in a Digital Substation: From Sensors to SCADA 

      Khodabakhsh, Athar; Yildirim Yayilgan, Sule; Houmb, Siv Hilde; Hurzuk, Nargis; Foros, Jørn; Istad, Maren Kristine (Chapter, 2020)
      Development of digital substations provides power industrial operation, real-time functionalities and information access. A main challenge in DS is to ensure security, availability, and reliability of power systems as in ...
    • CyberAIMs: A tool for teaching adversarial and systems thinking 

      Zoto, Erjon; Kowalski, Stewart James; Katt, Basel; Frantz, Christopher; Lopez Rojas, Edgar Alonso (Chapter, 2018)
      CyberAIMs stands for Cyber Agents’ Interactive Modeling and Simulation. We designed this tool in order to use it as an educational tool to teach Master students in a Cyber security course. This paper aims to describe the ...
    • CyberBike 

      Sølvberg, Audun (Master thesis, 2007)
      The idea about the CyberBike came to Jens G. Balchen - the founder of the Department of Engineering Cybernetics (ITK) at NTNU - in the 1980's. He wanted to make an unmanned autonomus bicycle, i.e. a bike that could run by ...
    • Cybercrime Economy - A Netnographic Study on the Dark Net Ecosystem for Ransomware 

      Bayoumy, Yara (Master thesis, 2018)
      Black hat hackers are far more shrewd than the public's stereotypical perception of them. They are no longer script kiddies who are trying to impress their social circles, but skilled businessmen with the general aim to ...
    • CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education 

      Pirta-Dreimane, Rūta; Brilingaite, A.; Roponena, Evita; Parish, Karen; Grabis, Janis; Lugo, Ricardo Gregorio; Bonders, Martins (Peer reviewed; Journal article, 2023)
      Incorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and ...
    • Cybergenomics: Application of behavioral genetics in cybersecurity 

      Domarkiene, Ingrida; Ambrozaitytė, Laima; Bukauskas, Linas; Rančelis, Tautvydas; Sütterlin, Stefan; Knox, Benjamin James; Maennel, Kaie; Maennel, Olaf; Parish, Karen; Lugo, Ricardo Gregorio; Brilingaitė, Agne (Peer reviewed; Journal article, 2021)
      Cybersecurity (CS) is a contemporary field for research and applied study of a range of aspects from across multiple disciplines. A cybersecurity expert has an in-depth knowledge of technology but is often also recognized ...
    • Cyberpower Praxis: A Study of Ways to Improve Understanding and Governance in the Cyber Domain 

      Knox, Benjamin James (Doctoral theses at NTNU;2020:153, Doctoral thesis, 2020)
      Powerful effects arriving through cyberspace present real-world shared problems that cannot be foreseen. This thesis acknowledges the modern-day Faustian Bargain of staying digitally dependent, staying vulnerable presented ...
    • Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ...
    • Cybersecurity awareness for children: A systematic literature review 

      Quayyum, Farzana; Cruzes, Daniela Soares; Jaccheri, Maria Letizia (Peer reviewed; Journal article, 2021)
      Cybersecurity for children has received much attention and has become a rapidly growing topic due to the increased availability of the internet to children and their consequent exposure to various online risks. This paper ...