Nye registreringer

  • Weaponized AI for cyber attacks 

    Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel (Journal article; Peer reviewed, 2021)
    Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies ...
  • Next Generation Parental Control 

    Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
    Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
  • Next Generation Parental Control 

    Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
    Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
  • System security assurance: A systematic literature review 

    Shukla, Ankur; Katt, Basel; Nweke, Livinus Obiora; Yeng, Prosper; Weldehawaryat, Goitom Kahsay (Peer reviewed; Journal article, 2022)
    System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and ...
  • A framework for using humanoid robots in the school learning environment 

    Mishra, Deepti; Parish, Karen; Lugo, Ricardo Gregorio; Wang, Hao (Peer reviewed; Journal article, 2021)
    With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ...
  • IT Risk Assessment Automation in Healthcare Networks 

    del Riego San Martín, Daniel (Master thesis, 2022)
    Cybersecurity has become a hot topic lately because of its importance in almost every industry. However, it has not been given the same relevancy everywhere and healthcare is an example. Millions of new devices have been ...
  • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

    de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
    We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
  • ML-based QoE Estimation in 5G Networks Using Different Regression Techniques 

    Schwarzmann, Susanna; Marquezan, Clarissa Cassales; Trivisonno, Riccardo; Nakajima, Shinichi; Barriac, Vincent; Zinner, Thomas (Journal article; Peer reviewed, 2022)
    Monitoring and providing customers with a satisfying Quality of Experience (QoE) is a crucial business incentive for mobile network operators (MNOs). While the MNO is capable of monitoring a vast amount of network-related ...
  • A Survey of 802.15.4 TSCH Schedulers for a Standardized Industrial Internet of Things 

    Urke, Andreas Ramstad; Kure, Øivind; Øvsthus, Knut (Peer reviewed; Journal article, 2021)
    Concepts such as Industry 4.0 and Cyber-Physical Systems may bring forward a new industrial revolution. These concepts require extensive connectivity far beyond what is provided by traditional industrial networks. The ...
  • BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem 

    Awuson-David, Kenny; Al-Hadhrami, Tawfik; Alazab, Mamoun; Shah, Nazaraf; Shalaginov, Andrii (Journal article; Peer reviewed, 2021)
    Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when, why and how a cyber adversary or an ...
  • Realizing Context-Aware Services through Intelligent Mobile Data Analysis 

    Oplenskedal, Magnus Karsten (Doctoral theses at NTNU;2022:234, Doctoral thesis, 2022)
    In recent years there has been a rapid development of mobile technologies, Internet of Things (IoT) and cellular network infrastructures. In combination with the fast evolution of data analysis, and particularly within ...
  • PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting 

    Kumar, Ajit; Agarwal, Vinti; Kumar Shandilya, Shishir; Shalaginov, Andrii; Upadhyay, Saket; Yadav, Bhawna (Peer reviewed; Journal article, 2020)
    Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. ...
  • Security Properties of Light Clients on the Ethereum Blockchain 

    Paavolainen, Santeri; Carr, Christopher (Peer reviewed; Journal article, 2020)
    Ethereum is a decentralized blockchain, known as being the second most popular public blockchain after Bitcoin. Since Ethereum is decentralised the canonical state is determined by the Ethereum network participants via a ...
  • Cyber Threat Information Requirements for Strategic Decision-Making 

    Tinde, Tiril Ligaya (Master thesis, 2022)
    I en cybertrusselsituasjon må informasjon utveksles på tvers av disiplinære og organisatoriske grenser for å støtte beslutningstakere på alle nivåer. Denne informasjonsutvekslingen er preget av teknisk kompleksitet og skjer ...
  • DEEPMATCH2: A comprehensive deep learning-based approach for in-vehicle presence detection 

    Oplenskedal, Magnus Karsten; Herrmann, Peter; Taherkordi, Amir (Journal article; Peer reviewed, 2021)
    The accurate detection of the mobile context information of public transportation vehicles and their passengers is a key feature to realize intelligent transportation systems. A topical example is in-vehicle presence ...
  • A graph theoretical approach to online predator detection 

    Aarekol, Anna Fridtun (Master thesis, 2022)
    Mange barn bruker mye tid på nettet, enten de ser på videoer, spiller spill eller snakker med venner eller fremmede over sosiale medier. Mange ulike plattformer er skapt med barn som målgruppe. Dette har muliggjort at barn ...
  • Cryptography for Innovative Blockchain Services 

    Raikwar, Mayank (Doctoral theses at NTNU;2022:241, Doctoral thesis, 2022)
    Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has been thriving. Much work has been carried out for blockchain use cases in different industrial areas such as healthcare, ...
  • Secure and Compliant Infrastructure as Code 

    Loeng, Anders Rindal; Bratberg, Morten Rognhaug; Bakke, Eirik Granvin (Bachelor thesis, 2022)
    Et økende antall bedrifter ønsker å oppnå målene sine ved å utnytte seg av fordelene ved bruk av sky. Bouvet har et ønske om å hjelpe små og mellomstore bedrifter (SMB) oppnå sine mål. Før en bedrift kan utnytte seg av ...
  • Detecting Malicious Python Packages in the Python Package Index (PyPI) 

    Milje, Anders Aasrum (Master thesis, 2022)
    Deling av åpen kildekode er en vanlig praksis i store deler av moderne programvareutvikling. Å dele programvare sparer utallige ressurser for utviklere, ikke bare fordi dette reduserer utviklingstid, men også en kan være ...
  • Industrial Control System Threat Intelligence, Process Safety, and Security Oriented Ontology 

    Berntsen, Sander Løken (Master thesis, 2022)
    Å beskytte industri kontroll systemer er en kompleks oppgave der feil kan føre til tap av liv. Denne oppgaven tar et dypdykk inn i litteraturen rundt industri kontroll system sikkerhet for å finne ut av hvilke elementer ...

Vis flere