Recent Submissions

  • Decentralized Identity Management Systems and Self-Sovereign Identity 

    Strindberg, Jan Magnus (Master thesis, 2019)
    Med den økende interessen for blockchain-teknologi, foreslås en rekke applikasjoner og bruksområder. Bruk av blockchain til å skape desen- traliserte identitetsstyringssystemer er et lovende bruksområde. Dette skyldes ...
  • Priming For Success: A Digital Service's Journey to Market 

    Trinh, Duy Tien (Master thesis, 2019)
    Hotellgjester ber om tjenester av mer personlig grad, der innendørskart kan være en nøkkelkomponent. Likevel er hotellbransjen en rigid og konservativ industri, og har hittil vært en sen implementør av ny teknologi. MazeMap ...
  • Security Testing of the Pacemaker Ecosystem 

    Kristiansen, Eivind Skjelmo; Wilhelmsen, Anders Been (Master thesis, 2018)
    In later years there has been an increased attention regarding the cyber-security in `smart' devices. With the rise of the Internet of Things it is becoming popular to connect every `smart' device to the internet, including ...
  • CyberAIMs: A tool for teaching adversarial and systems thinking 

    Zoto, Erjon; Kowalski, Stewart James; Katt, Basel; Frantz, Christopher; Lopez Rojas, Edgar Alonso (Chapter, 2018)
    CyberAIMs stands for Cyber Agents’ Interactive Modeling and Simulation. We designed this tool in order to use it as an educational tool to teach Master students in a Cyber security course. This paper aims to describe the ...
  • Autonomous Management of Energy-Harvesting IoT Nodes Using Deep Reinforcement Learning 

    Murad, Abdulmajid Abdullah Yahya; Kraemer, Frank Alexander; Bach, Kerstin; Taylor, Gavin (Chapter, 2019)
    Reinforcement learning (RL) is capable of managing wireless, energy-harvesting IoT nodes by solving the problem of autonomous management in non-stationary, resource-constrained settings. We show that the state-of-the-art ...
  • Network Traffic Driven Storage Repair 

    Gligoroski, Danilo; Kralevska, Katina; Jensen, Rune Erlend; Simonsen, Per (Journal article; Peer reviewed, 2019)
    Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that ...
  • Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation 

    Szekeres, Adam; Wasnik, Pankaj Shivdayal; Snekkenes, Einar Arthur (Chapter, 2019)
    Abstract: Human behavior plays a significant role within the domain of information security. The Conflicting Incentives Risk Analysis (CIRA) method focuses on stakeholder motivation to analyze risks resulting from the ...
  • Obtaining precision-recall trade-offs in fuzzy searches of large email corpora 

    Porter, Kyle; Petrovic, Slobodan (Journal article; Peer reviewed, 2018)
    Fuzzy search is often used in digital forensic investigations to find words that are stringologically similar to a chosen keyword. However, a common complaint is the high rate of false positives in big data environments. ...
  • Security Analysis of Wireless BAN in e-Health 

    Muka, Romina; Yildirim Yayilgan, Sule; Sevrani, Kozeta (Journal article; Peer reviewed, 2017)
    The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, ...
  • Recent Advancements in Intrusion Detection Systems for the Internet of Things 

    Khan, Zeeshan Ali; Herrmann, Peter (Journal article; Peer reviewed, 2019)
    Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms ...
  • Pervasive Smart Contracts for Blockchains in IoT Systems 

    Taherkordi, Amirhosein; Herrmann, Peter (Chapter, 2018)
    The blockchain technology has gained tremendous attention thanks to its decentralized structure, immutability, and enhanced security and privacy guarantees. Blockchain has the potential to address security and privacy ...
  • Mobile Edge as Part of the Multi-Cloud Ecosystem: A Performance Study 

    Dreibholz, Thomas; Mazumdar, Somnath; Zahid, Feroz; Taherkordi, Amirhosein; Gran, Ernst Gunnar (Chapter, 2019)
    Cloud computing has revolutionised the development and deployment of applications by running them cost-effectively in remote data centres. With the increasing need for mobility and micro-services, particularly with the ...
  • Using the object ID index as an investigative approach for NTFS file systems 

    Nordvik, Rune; Toolan, Fergus; Axelsson, Stefan (Journal article; Peer reviewed, 2019)
    When investigating an incident it is important to document user activity, and to document which storage device was connected to which computer. We present a new approach to documenting user activity in computer systems ...
  • Death anxiety and visual oculomotor processing of arousing stimuli in a free view setting 

    Wendelberg, Linda; Volden, Frode; Yildirim, Sule (Journal article; Peer reviewed, 2017)
    The main goal of this study was to determine how death anxiety (DA) affects visual processing when confronted with arousing stimuli. A total of 26 males and females were primed with either DA or a neutral primer and were ...
  • Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks 

    Vergados, Dimitrios; Michalas, Angelos; Kralevska, Katina; Vergados, Dimitrios D. (Chapter, 2019)
    Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches ...
  • Towards Fairness and Decentralisation in Modern Cryptocurrencies 

    Carr, Christopher Alan (Doctoral theses at NTNU;2019:82, Doctoral thesis, 2019)
    he ideas contained within the thesis build towards the goal of improving both fairness and decentralisation in modern cryptocurrcncics. The thesis has four main contributions. The first contribution is towards client ...
  • Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging 

    Sørseth, Christian; Zhou, Xianyu Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2018)
    Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ...
  • Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects 

    Cruzes, Daniela Soares; Jaatun, Martin Gilje; Bernsmed, Karin; Tøndel, Inger Anne (Journal article; Peer reviewed, 2018)
    The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for ...
  • Dynamic Computation of Connectivity Data 

    Meyer, Jon Arild Ekberg (Master thesis, 2019)
    Ytelsen til den underliggende kommunikasjonsteknologien spiller en viktig rolle i Vehicular Networks (VNs). Strenge krav må oppfylles for å sikre nødvendig sikkerhet og robusthet, i tillegg til å gi brukertilfredshet. I ...
  • Efficient routing and reconfiguration in virtualized HPC environments with vSwitch-enabled lossless networks 

    Tasoulas, Evangelos; Zahid, Feroz; Gran, Ernst Gunnar; Begnum, Kyrre; Johnsen, Bjørn Dag; Skeie, Tor (Journal article; Peer reviewed, 2019)
    To meet the demands of communication‐intensive workloads in the cloud, virtual machines (VMs) should utilize low overhead network communication paradigms. In general, such paradigms enable VMs to directly communicate with ...

View more