Recent Submissions

  • Secure channels and termination: The last word on TLS 

    Boyd, Colin Alexander; Hale, Britta (Peer reviewed; Journal article, 2019)
    Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ...
  • Towards protected VNFs for multi-operator service delivery 

    Boyd, Colin Alexander; Biczok, Gergely; Marku, Enio (Chapter, 2019)
    Value-added 5G verticals are foreseen to be delivered as a service chain over multiple network operators with extensive outsourcing of Virtual Network Functions (VNFs). In this short paper we introduce the initial design ...
  • Evidential Reasoning for Forensic Readiness 

    Liao, Yi-Ching; Langweg, Hanno (Peer reviewed; Journal article, 2016)
    To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for ...
  • Er Bug Bounty Programmer en Bærekraftig Behandling for Sikkerhetsmangler? 

    Trond Hønsi (Master thesis, 2020)
    I en verden hvor hackere tar datasystemer som gisler i bytte mot løsepenger, og myndighetene truer med bøter hvis personinformasjon kommer på avveie, blir det stadig viktigere å sikre datasystemene sine mot trusler. Flere ...
  • Exploring the Relation Between Mobile Network Type and Mobile Application Usage 

    Hokstad, Katarina (Master thesis, 2019)
    I dagens samfunn er bruk av smarttelefoner og applikasjoner en stor del av folks daglige liv. Utviklingen gjennom de siste årene med en stor økning i utbredelsen av både smarttelefoner og antall applikasjoner, har ført til ...
  • Automatisk konfigurering av rutingsdata 

    Aagesen, Finn Arve (Master thesis, 2019)
    Dagens “Internet Service Providers” må håndtere et økende antall kunder og også en økning i bruken av ulike tjenester. I denne virkelighet blir nettadministrasjonen meget viktig. En av funksjonene er konfigurering av ...
  • Brain and Body “Fingerprints” of Existential Anxiety and Their Relevance for the Identification of Potential Terrorists: A Research Note 

    Wendelberg, Linda (Peer reviewed; Journal article, 2020)
    The literature on radicalization documents that the identification of individuals who might take part in terrorist acts is difficult. In the field of terrorism studies, there is a lack of research on how the mind of ...
  • Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain 

    Mendis, Handunneththi V. Kalpanie; Balapuwaduge, Indika A.M.; Li, Frank Yong (Peer reviewed; Journal article, 2019)
    Ultra-reliable low latency communication (URLLC), which refers to achieving almost 100% reliability at a certain (satisfactory) level of services and stringent latency, is one of the key requirements for 5G networks. ...
  • Survivability Analysis of Infrastructure-based Wireless Networks under Natural Disasters 

    Xie, Lang (Doctoral theses at NTNU;2020:34, Doctoral thesis, 2020)
    Ubiquitous wireless communications have led to an increase in the importance of mobile networks in disaster recovery and mission-critical services. Network design and operation of mobile network infrastructure requires ...
  • Cyberpower Praxis: A Study of Ways to Improve Understanding and Governance in the Cyber Domain 

    Knox, Benjamin James (Doctoral theses at NTNU;2020:153, Doctoral thesis, 2020)
    Powerful effects arriving through cyberspace present real-world shared problems that cannot be foreseen. This thesis acknowledges the modern-day Faustian Bargain of staying digitally dependent, staying vulnerable presented ...
  • A Multi-Discipline Approach for Enhancing Developer Learning in Software Security 

    Wen, Shao-Fang (Doctoral theses at NTNU;2020:151, Doctoral thesis, 2020)
    Building secure software is challenging. Developers should possess proper security knowledge and skills so that they can resist security attacks and implement security countermeasures effectively. However, the lack of ...
  • Predicting likelihood of legitimate data loss in email DLP 

    Faiz, Mohamed Falah; Junaid, Arshad; Alazab, Mamoun; Shalaginov, Andrii (Journal article; Peer reviewed, 2019)
    The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ...
  • An Analytical Model for Sparse Network Codes: Field Size Considerations 

    Zarei, Amir; Pahlevani, Peyman; E. Lucani, Daniel (Peer reviewed; Journal article, 2020)
    One of the by-products of Sparse Network Coding (SNC) is the ability to perform partial decoding, i.e., decoding some original packets prior to collecting all needed coded packets to decode the entire coded data. Due to ...
  • On the Partial Decoding Delay of Sparse Network Coding 

    Zarei, Amir; Pahlevani, Peyman; Davoodi Monfared, Mansoor (Peer reviewed; Journal article, 2018)
    Sparse network coding (SNC) is a promising technique for reducing the complexity of random linear network coding (RLNC), by selecting a sparse coefficient matrix to code the packets. However, the performance of SNC for the ...
  • A new ski injury registration system architecture using mobile applications to enhance skiing safety 

    Yildirim, Sule; Du, Yang; Dalipi, Fisnik; Jeppesen, Jonas C. (Peer reviewed; Journal article, 2016)
    Mobile apps play an increasingly important role in healthcare institutions by enhancing the quality of healthcare services. Their role in sport injury prevention is also instrumental. In this article, we propose a system ...
  • A Novel hybrid IDS based on modified NSGAII-ANN and Random Forest 

    Golrang, Anahita; Golrang, Alale; Yildirim Yayilgan, Sule; Elezaj, Ogerta (Peer reviewed; Journal article, 2020)
    Machine-learning techniques have received popularity in the intrusion-detection systems in recent years. Moreover, the quality of datasets plays a crucial role in the development of a proper machine-learning approach. ...
  • Vulnerability Discovery Modelling With Vulnerability Severity 

    Ankur, Shukla; Katt, Basel; Nweke, Livinus Obiora (Peer reviewed; Journal article, 2019)
    Web browsers are primary targets of attacks because of their extensive uses and the fact that they interact with sensitive data. Vulnerabilities present in a web browser can pose serious risk to millions of users. Thus, ...
  • Towards Blockchain-based GDPR compliant Online Social Networks: Challenges, Opportunities and Way Forward 

    Ahmed, Javeed; Yildirim Yayilgan, Sule; Ramachandra, Raghavendra; Abomhara, Mohamed Ali Saleh; Nowostawski, Mariusz (Peer reviewed; Journal article, 2019)
    Online Social Networks (OSNs) are very popular and widely adopted by the vast majority of Internet users across the globe. Recent scandals on the abuse of users’ personal information via these platforms have raised serious ...
  • The Root Causes of Compromised Accounts at the University 

    Nyblom, Philip Johannes Brugmans; Wangen, Gaute; Kianpour, Mazaher; Østby, Grethe (Chapter, 2020)
    Compromised usernames and passwords are a continuous problem that several organizations struggle with even though this is a known problem with known solutions. Passwords remain a problem for the modern University as it ...
  • From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes 

    Augusto-Gonzalez, Javier; Collen, Anastasija; Evangelatos, S; Anagnostopoulos, Marios; Spathoulas, Georgios; Giannoutakis, Konstantinos M.; Votis, Konstantinos; Tzovaras, Dimitrios; Genge, B; Gelenbe, Erol; Nijdam, Niels Alexander (Peer reviewed; Journal article, 2019)
    The H2020 European research project GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control - aims to deploy a highly effective security framework for IoT smart home residents through a novel ...

View more