Recent Submissions

  • Reliability validation enabling framework (RVEF) for digital forensics in criminal investigations 

    Stoykova, Radina; Franke, Katrin (Journal article; Peer reviewed, 2023)
    This paper proposes a formal reliability validation enabling framework (RVEF) for evaluation of digital forensics in criminal investigations. The RVEF is informed by examined theoretical and conceptual gaps between law and ...
  • Container-Based IoT Architectures: Use Case for Visual Person Counting 

    Santos Veiga, Tiago; Asad, Hafiz Areeb; Kraemer, Frank Alexander; Bach, Kerstin (Chapter, 2023)
    This paper studies the deployment process for a use case of visual person counting from cameras located in outdoor areas and shows how a containerized solution fulfills the particular requirements for the use case, ...
  • Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey 

    Bang, Ankur O.; Rao, Udai Pratap; Kaliyar, Pallavi; Conti, Mauro (Peer reviewed; Journal article, 2023)
    Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) protocol ...
  • Honey-list based authentication protocol for industrial IoT swarms 

    El-Zawawy, Mohamed A.; Kaliyar, Pallavi; Conti, Mauro; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
    Industrial Internet of Things (IIoT) systems are advanced IoT systems composed of sensor devices supported with dynamic objects such as smart vehicles and drones. The collaboration among static and heterogeneous mobile ...
  • A quantitative framework for security assurance evaluation and selection of cloud services: a case study 

    Shukla, Ankur; Katt, Basel; Yamin, Muhammad Mudassar (Journal article; Peer reviewed, 2023)
    Due to the high adoption of cloud services, the protection of data and information is critical. Cloud service customers (CSCs) need help to obtain the authoritative assurances required for the cloud services and negotiate ...
  • Speaking the Same Language Through Logic and Ontologies 

    Simić, Aleksandra (Master thesis, 2024)
    In recent years, with the development of technologies such as Software-Defined Networking, Network Function Virtualization and Infrastructure as Code (IaC), modern Information and Communication Technology infrastructures ...
  • UoCAD: An Unsupervised Online Contextual Anomaly Detection Approach for Multivariate Time Series from Smart Homes 

    Toor, Aafan Ahmad; Lin, Jia-Chun; Gran, Ernst Gunnar; Lee, Ming-Chang (Chapter, 2024)
    In the context of time series data, a contextual anomaly is considered an event or action that causes a deviation in the data values from the norm. This deviation may appear normal if we do not consider the timestamp ...
  • How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection? 

    Lee, Ming-Chang; Lin, Jia-Chun; Gran, Ernst Gunnar (Chapter, 2021)
    Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion detection, etc. ...
  • Value of Information in Wireless Sensor Network Applications and the IoT: A Review 

    Alawad, Faiga Mohammad Mohammad Ahmed; Kraemer, Frank Alexander (Journal article; Peer reviewed, 2022)
    Value of Information (VoI) is a concept to assess the usefulness of information for a specific goal, and has in the last decade experienced a growing interest also for Wireless Sensor Network (WSN) applications and the ...
  • Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims 

    Berg, Silje; Thorvik, Tilde Gregusson; Meland, Per HÃ¥kon (Journal article; Peer reviewed, 2023)
    Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ...
  • Post-Quantum Secure Biometric Systems 

    Bauspieß, Pia Victoria (Doctoral theses at NTNU;2024:226, Doctoral thesis, 2024)
    Biometrics, which is defined as the automated recognition of individuals based on their behavioural and biological characteristics, can be applied to increase the trust and usability of digital interactions. Due to their ...
  • 3-D Face Morphing Attacks: Generation, Vulnerability and Detection 

    Singh, Jag Mohan; Ramachandra, Raghavendra (Journal article; Peer reviewed, 2024)
    Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction ...
  • Robust algorithms for 2D and 3D Face Morphing Attacks: Generation and Detection 

    Singh, Jag Mohan (Doctoral theses at NTNU;2024:202, Doctoral thesis, 2024)
    Biometric Authentication (Biometrics) is a powerful tool that authenticates individuals using digital means, which includes biological or behavioral characteristics. Biometrics harnesses biological features such as ...
  • Targeted Black Box Adversarial Attacks On Deep Learning Image Retrieval 

    McCulloch, Maria Kleppestø (Master thesis, 2024)
    Helt siden oppdagelsen har fiendtlige eksempler fengslet forskere på tvers av forskjellige domener innen maskinlæring. I denne avhandlingen vil fiendtlige eksempler utforskes nærmere, med et spesielt fokus på å lage ...
  • Top-down and bottom-up approaches to video quality of experience studies; overview and proposal of a new model 

    Koniuch, Kamil; barakovic, Sabina; Baraković Husić, Jasmina; Subramanian, Sruti; De Moor, Katrien Rachel W; Janowski, Lucjan; Wierzchoń, Michał (Journal article; Peer reviewed, 2024)
    Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield user ...
  • Automatically Detecting Political Viewpoints in Norwegian Text 

    Doan, Tu My; Baumgartner, David; Kille, Benjamin Uwe; Gulla, Jon Atle (Journal article, 2024)
    We introduce three resources to support research on political texts in Scandinavia. The encoder-decoder transformer models sp-t5 and sp-t5-keyword were trained on political texts. The nor-pvi (available at https://tinyur ...
  • Augmenting sentiment prediction capabilities for code-mixed tweets with multilingual transformers 

    Hashmi, Ehtesham; Yildirim-Yayilgan, Sule; Shaikh, Sarang (Journal article; Peer reviewed, 2024)
    People in the modern digital era are increasingly embracing social media platforms to express their concerns and emotions in the form of reviews or comments. While positive interactions within diverse communities can ...
  • Opportunities of Insecurity Refactoring for Training and Software Development 

    Schuckert, Felix (Doctoral theses at NTNU;2024:106, Doctoral thesis, 2024)
    Teaching software security is complex and should involve practical exercises. Practical exercises require software artifacts and projects that contain vulnerabilities. The vulnerabilities can be exploited to understand ...
  • Do you have any privacy? Human activity privacy leak from wearable devices 

    Tønnesen, Rolf Martin (Master thesis, 2023)
    Dette prosjektet viser gjennom et simulert scenario hvordan personlig informasjon kan lekkes til en utenforstående person med uhederlige hensikter fra helse og aktivitetssensorer. Metoden som brukes i prosjektet er å ...
  • HEBI: Homomorphically Encrypted Biometric Indexing 

    Bauspieß, Pia; Grimmer, Marcel; Fougner, Cecilie; Le Vasseur, Damien; Stöcklin, Thomas Thaulow; Rathgeb, Christian; Kolberg, Jascha; Costache, Anamaria; Busch, Christoph (Chapter, 2023)
    Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ...

View more