Institutt for informasjonssikkerhet og kommunikasjonsteknologi
Recent Submissions
-
Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging
(Peer reviewed; Journal article, 2020)Conventional fingerprint sensors that are deployed in real-life applications lack the ability to peer inside a finger beyond the external surface. Subsurface information can provide complimentary biometric characteristics ... -
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
(Peer reviewed; Journal article, 2020)Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ... -
Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid
(Peer reviewed; Journal article, 2020)Information and Communication Technologies (ICT), Wide Area Measurement Systems (WAMS) and state estimation represent the key-tools for achieving a reliable and accurate knowledge of the power grid, and represent the ... -
SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture
(Peer reviewed; Journal article, 2021)The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of ... -
Bloom’s Learning Outcomes’ Automatic Classification Using LSTM and Pretrained Word Embeddings
(Peer reviewed; Journal article, 2021)Bloom’s taxonomy is a popular model to classify educational learning objectives into different learning levels for three domains including cognitive, affective and psycho motor. Each domain is further detailed into different ... -
Managing Cyber Security Risks of the Cyber-Enabled Ship
(Peer reviewed; Journal article, 2020)One aspect of the digital transformation process in the shipping industry, a process often referred to as Shipping 4.0, is the increased digitization of on board systems that goes along with increased automation in and ... -
Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges
(Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ... -
Lex-pos feature-based grammar error detection system for the English language
(Peer reviewed; Journal article, 2020)This work focuses on designing a grammar detection system that understands both structural and contextual information of sentences for validating whether the English sentences are grammatically correct. Most existing systems ... -
Tracing your smart-home devices conversations: A real world iot traffic data-set
(Peer reviewed; Journal article, 2020)Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ... -
Risk Perceptions on Social Media Use in Norway
(Peer reviewed; Journal article, 2020)Social media are getting more and more ingrained into everybody’s lives. With people’s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy ... -
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets
(Peer reviewed; Journal article, 2019)Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ... -
Light fields for face analysis
(Peer reviewed; Journal article, 2019)The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ... -
Videoconference Fatigue: A Conceptual Analysis
(Peer reviewed; Journal article, 2022)Videoconferencing (VC) is a type of online meeting that allows two or more participants from different locations to engage in live multi-directional audio-visual communication and collaboration (e.g., via screen sharing). ... -
Medical students' perceptions of a blockchain-based decentralized work history and credentials portfolio: Qualitative feasibility study
(Peer reviewed; Journal article, 2021)Background: Increased digitization of health care might challenge some of the trust functions that are established in a traditional health care system. We have, with the concept of VerifyMed, developed a decentralized ... -
Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges
(Peer reviewed; Journal article, 2022)The skill shortage in global cybersecurity is a well-known problem; to overcome this issue, cyber ranges have been developed. These ranges provide a platform for conducting cybersecurity exercises; however, conducting such ... -
5G Network Slicing for Wi-Fi Networks
(Journal article, 2021)Future networks will pave the way for a myriad of applications with different requirements and Wi-Fi will play an important role in local area networks. This is why network slicing is proposed by 5G networks, allowing to ... -
Tools for Organizing an Effective Virtual Academic Conference
(Peer reviewed; Journal article, 2022)Academic conferences are an indispensable component of contemporary science, giving researchers the opportunity to present the results of recent investigations, become familiar with other scholars' studies, and build and ... -
Leveraging The USB Power Delivery Implementation For Digital Forensic Acquisition
(Peer reviewed; Journal article, 2021)Modern consumer devices present major challenges in digital forensic investigations due to security mechanisms that protect user data. The entire physical attack surface of a seized device such as a mobile phone must be ... -
Advancing the concept of cybersecurity as a public good
(Journal article; Peer reviewed, 2022)This paper presents an agent-based model of cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information societies in the ... -
Increasing the effectiveness of technical security testing methods with a comparative study
(Master thesis, 2021)Organisations use ethical hacking services as a key component to assess their overall cyber security posture. Basis for those services is a set of technical security testing methods such as vulnerability scanning, penetration ...