Institutt for informasjonssikkerhet og kommunikasjonsteknologi
Recent Submissions
-
Operationalizing Solar Energy Predictions for Sustainable, Autonomous IoT Device Management
(Peer reviewed; Journal article, 2020)For sustainable Internet-of-Things (IoT) systems, the solar power prediction is an essential element to optimize performance, allowing devices to schedule energy-intensive tasks in periods with excess energy. In regions ... -
Analysis of uPort Open, an identity management blockchain-based solution
(Peer reviewed; Journal article, 2020)Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ... -
Autonomous IoT Device Management Systems: Structured Review and Generalized Cognitive Model
(Peer reviewed; Journal article, 2020)Research on autonomous management for large-scale deployments of constrained devices is still a maturing field in the Internet of Things (IoT). Although much research has been conducted on how to achieve autonomous management ... -
IoT Vulnerability Scanning: A State of the Art
(Chapter, 2020)Our modern life becomes more and more dependent on tech-nology and services provided through an increasing number of deployed devices «Things» which are connected over networks that can sometimes be accessed remotely via ... -
Deriving QoE in Systems: From Fundamental Relationships to a QoE-based Service-level Quality Index
(Peer reviewed; Journal article, 2020)With Quality of Experience (QoE) research having made significant advances over the years, service and network providers aim at user-centric evaluation of the services provided in their system. The question arises how to ... -
Resilience of communication networks to random failures and disasters: An optimization perspective
(Peer reviewed; Journal article, 2020)Communication networks are subject to many challenges leading to single or multiple failures of its elements. Example failure scenarios include unintentional failures due to scheduled maintenance activities or massive ... -
Impact of cyber risk on the safety of the MilliAmpere2 Autonomous Passenger Ship
(Peer reviewed; Journal article, 2020)The digitalization of the maritime sector is continuously growing, leading to increased automation, such as, the development of autonomous vessels. The Autonomous Passenger Ship (APS) is a characteristic instantiation of ... -
Efficient Allocation of Resources in NFV-Enabled Networks
(Doctoral theses at NTNU;2020:399, Doctoral thesis, 2020)The network traffic and number of devices that are connected within a network are increasing, driven by the increase in network coverage as well as the types of network services provisioned. The provisioning of network ... -
Clinical phenotypes and long-term prognosis in white patients with biopsy-verified hypertensive nephrosclerosis
(Peer reviewed; Journal article, 2020)Introduction Hypertensive nephrosclerosis is considered the second most common cause of end-stage renal disease (ESRD), but it is still an insufficiently studied and controversial disease entity. More information on the ... -
Human Motivation as the Basis of Information Security Risk Analysis
(Doctoral theses at NTNU;2020:373, Doctoral thesis, 2020)The electric grid represents a critical infrastructure which has an essential rolein supporting societies. Therefore, it is important to identify, analyse and mitigate undesirable events that may disrupt the reliable ... -
Applying software‑defined networking to support telemedicine health consultation during and post Covid‑19 era
(Peer reviewed; Journal article, 2020)The novel coronavirus disease-19 (COVID-19) infection has altered the society, economy, and entire healthcare system. Whilst this pandemic has presented the healthcare system with unprecedented challenges, it has rapidly ... -
Enabling Defensive Deception by Leveraging Software Defined Networks
(Chapter, 2020)Computer networks are critical for modern society and protecting their security is of high importance. Due to their increasing size and complexity providing the required cyber security counter measures has become a very ... -
The Isolation Concept in the 5G Network Slicing
(Chapter, 2020)The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ... -
Generic Metadata Time Carving
(Peer reviewed; Journal article, 2020)Recovery of files can be a challenging task in file system investigations, and most carving techniques are based on file signatures or semantics within the file. However, these carving techniques often only recover the ... -
PS-DeVCEM: Pathology-sensitive deep learning model for video capsule endoscopy based on weakly labeled data
(Peer reviewed; Journal article, 2020)We propose a novel pathology-sensitive deep learning model (PS-DeVCEM) for frame-level anomaly detection and multi-label classification of different colon diseases in video capsule endoscopy (VCE) data. Our proposed model ... -
Information-Driven Adaptive Sensing Based on Deep Reinforcement Learning
(Chapter, 2020)In order to make better use of deep reinforcement learning in the creation of sensing policies for resource-constrained IoT devices, we present and study a novel reward function based on the Fisher information value. This ... -
Risk Quantification to Measure Security Performance - SecurityScore Assessment Methodology
(Master thesis, 2019)With the digitalisation of information, the security aspect of it has become more important than ever before. It was reported in an independent study that 7 out of 10 attacks on information assets of an organisation are ... -
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
(Chapter, 2020)In recent years, software defined networking (SDN) has been proposed for enhancing the security of industrial control networks. However, its ability to guarantee the quality of service (QoS) requirements of such networks ... -
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
(Peer reviewed; Journal article, 2020)Data breaches in healthcare continue to grow exponentially, calling for a rethinking into better approaches of security measures towards mitigating the menace. Traditional approaches including technological measures, have ... -
MODEL-DRIVEN ENGINEERING OF COMPLEX SYSTEMS Supporting the Design of Reactive Systems with Augmented Modeling and Verification Mechanisms
(Doctoral theses at NTNU;2020:287, Doctoral thesis, 2020)This thesis motivates the need for the Reactive Blocks approach for model-driven Complex Systems Engineering (CSE). With the booming of the Internet economy and development of the Internet of Things (IoT), interconnected ...