Institutt for informasjonssikkerhet og kommunikasjonsteknologi
Recent Submissions
-
Autonomous Flow-Based TSCH Scheduling for Heterogeneous Traffic Patterns: Challenges, Design, Simulation, and Testbed Evaluation
(Peer reviewed; Journal article, 2023)The Industrial Internet of Things needs wireless communication with bounded latency and stronger robustness. Nodes employing the Time Slotted Channel Hopping (TSCH) MAC operate according to a schedule, and recent work on ... -
Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid.
(Peer reviewed; Journal article, 2023)Cyber-attacks on digital supply chains are rising, and Critical Infrastructures (CIs) such as the Smart Grid are prime targets. There is increasing evidence that vendors, service providers, and outsourced IT -providers are ... -
Cyber Crisis Chess Board for Strategic and Tactical Level of Organizations
(Master thesis, 2023)En rekke alvorlige dataangrep i de senere år har gang på gang vist hvor avhengig vi som samfunn er av digitale løsninger, og hvor sårbare vi som samfunn er, skulle disse bli satt ut av spill. Ved bortfall av digitale ... -
Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense
(Peer reviewed; Journal article, 2023)In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively ... -
Privacy-preserving continuous authentication using behavioral biometrics
(Peer reviewed; Journal article, 2023)Continuous authentication modalities collect and utilize users’ sensitive data to authenticate them continuously. Such data contain information about user activities, behaviors, and other demographic information, which ... -
Web3 Security in Reseller Markets with Proof of Concept Implementations
(Master thesis, 2023)I tradisjonelle bruktmarkeder er det utfordringer relatert til håndtering av kvitteringer, skjevfordelt informasjonstilgang, mangel på tillit og tvilsomt opphav. Denne avhandlingen presenterer et konseptbevis (POC) som ... -
Web3 Security in Reseller Markets with Proof of Concept Implementations
(Master thesis, 2023)I tradisjonelle bruktmarkeder er det utfordringer relatert til håndtering av kvitteringer, skjevfordelt informasjonstilgang, mangel på tillit og tvilsomt opphav. Denne avhandlingen presenterer et konseptbevis (POC) som ... -
Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases
(Peer reviewed; Journal article, 2023)In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment ... -
Military application of 5G
(Master thesis, 2023)Det gjøres store fremskritt innen mobilkommunikasjon og det tas stadig nye steg. Med 5G så tilgjengeliggjør det et nettverk med lav forsinkelse, muligheten til å koble til mange brukere og tilgang til høy båndbredde. ... -
Network Slicing in Beyond 5G: Implementation, Isolation, and Coexistence
(Doctoral theses at NTNU;2023:407, Doctoral thesis, 2023)The contemporary landscape of telecommunications is defined by the advent of Fifth Generation (5G) and the tantalizing promise of Beyond 5G (B5G) networks. 5G and B5G networks are the keys to fulfilling a massive number ... -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
(Peer reviewed; Journal article, 2023)Purpose Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance ... -
A Quantitative Security Evaluation and Analysis Model for Web Applications Based on OWASP Application Security Verification Standard
(Peer reviewed; Journal article, 2023)In today's digital world, web applications are popular tools used by businesses. As more and more applications are deployed on the web, they are seen as increasingly attractive targets by malicious actors eager to exploit ... -
Giving the Police a Head Start: Norwegian Named Entity Recognition Dataset and Model Development for Investigative Purposes
(Master thesis, 2023)Nesten alle eier digitale enheter og digitale bevis har blitt en viktig del av etterfor- skninger. Den store mengden med digitale enheter og bevis som må undersøkes fører til et etterslep, som igjen kan føre til forsinkelser ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
SCDet: A Robust Approach for the Detection of Skin Lesions
(Journal article; Peer reviewed, 2023)Red, blue, white, pink, or black spots with irregular borders and small lesions on the skin are known as skin cancer that is categorized into two types: benign and malignant. Skin cancer can lead to death in advanced stages, ... -
Assessing the Usability of ChatGPT for Formal English Language Learning
(Journal article; Peer reviewed, 2023)Recently, the emerging technologies have been constantly shaping the education domain, especially the use of artificial intelligence (AI) for language learning, which has attracted significant attention. Many of the AI ... -
Cyber Risk Assessment for SHips (CRASH)
(Peer reviewed; Journal article, 2024)The maritime industry is undergoing a digital transformation, with an increasing integration of Information Technology (IT) and Operational Technology (OT) systems on modern vessels. Its multiple benefits notwithstanding, ... -
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
(Peer reviewed; Journal article, 2023)Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks ... -
Space Oddity: Space Cybersecurity Lessons from a Simulated OPS-SAT Attack
(Master thesis, 2023)The space industry is currently experiencing a rapid transformation, driven by innovations both in space and on the ground. Lower access barriers to orbit and the widespread use of commercial off-the-shelf components have ...