Recent Submissions

  • Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review 

    Matias, Igor; Garcia, Nuno; Pirbhulal, Sandeep; Felizardo, Virginie; Pombo, Nuno; Zacarias, Henriques; Sousa, Miguel; Zdravevski, Eftim (Peer reviewed; Journal article, 2021)
    Atrial Fibrillation (AF) is a type of arrhythmia characterized by irregular heartbeats, with four types, two of which are complicated to diagnose using standard techniques such as Electrocardiogram (ECG). However, and ...
  • Method for subjective assessment of immersion in audiovisual experiences 

    Agrawal, Sarvesh; Bech, Soren; Berentsen, Klaus; De Moor, Katrien; Forchhammer, Soren (Journal article; Peer reviewed, 2021)
    Studying immersion in audiovisual experiences can help technologists deliver engaging and enhanced experiences. As a first step toward this goal this paper details an investigation conducted to establish an experimental ...
  • Robust Algorithms For Face Morphing Attack Detection: Database, Vulnerability and Detection 

    Venkatesh, Sushma Krupa (Doctoral theses at NTNU;2022:299, Doctoral thesis, 2022)
    Biometrics has emerged as a promising technology for automated recognition of individuals. The stored biometric characteristics are used to recognise an individual and hence biometrics technology plays a major role in ...
  • Confidentiality and Integrity for Sensor Data in the Cloud-IoT Architecture 

    Tjomsland, Håkon (Master thesis, 2022)
    Tingenes internett, kjent som Internet of Things (IoT) på engelsk, er vidt etablerte enheter som er nyttige i ulike bransjer. IoT-sensorer kan hente informasjon som temperatur, fuktighet og berøring. Siden IoT-sensorer ...
  • Privacy Analysis of Next Generation Emergency Communication Network Devices in Norway 

    Varhaugvik, Sigurd (Master thesis, 2022)
    Beredskapstjenester som ambulanse, brannmenn og politi er avgjørende for å opprettholde et trygt og sikkert samfunn. Samarbeid er essensielt for arbeidet og krever et pålitelig trådløst kommunikasjonsnettverk. Terrestrial ...
  • Secure user-friendly on-premises storage for sensor data 

    Giraud Théau (Master thesis, 2022)
    Sensorer i Internet of Things blir mer og mer utbredt, særlig lettvektssenorer som er avhengige av lav-energi mikrokontrollere. Mange selskaper utvikler slike sensorer med skylagring i tankene. Men nødvendigheten for at ...
  • Weaponized AI for cyber attacks 

    Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel (Journal article; Peer reviewed, 2021)
    Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies ...
  • Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications 

    Pirbhulal, Sandeep; Abie, Habtamu; Shukla, Ankur (Peer reviewed; Journal article, 2022)
    In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems became the major concern for researchers and health organizations. With time, the sophistication of these attacks is ...
  • Next Generation Parental Control 

    Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
    Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
  • Next Generation Parental Control 

    Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
    Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
  • System security assurance: A systematic literature review 

    Shukla, Ankur; Katt, Basel; Nweke, Livinus Obiora; Yeng, Prosper; Weldehawaryat, Goitom Kahsay (Peer reviewed; Journal article, 2022)
    System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and ...
  • A framework for using humanoid robots in the school learning environment 

    Mishra, Deepti; Parish, Karen; Lugo, Ricardo Gregorio; Wang, Hao (Peer reviewed; Journal article, 2021)
    With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ...
  • IT Risk Assessment Automation in Healthcare Networks 

    del Riego San Martín, Daniel (Master thesis, 2022)
    Cybersecurity has become a hot topic lately because of its importance in almost every industry. However, it has not been given the same relevancy everywhere and healthcare is an example. Millions of new devices have been ...
  • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

    de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
    We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
  • ML-based QoE Estimation in 5G Networks Using Different Regression Techniques 

    Schwarzmann, Susanna; Marquezan, Clarissa Cassales; Trivisonno, Riccardo; Nakajima, Shinichi; Barriac, Vincent; Zinner, Thomas (Journal article; Peer reviewed, 2022)
    Monitoring and providing customers with a satisfying Quality of Experience (QoE) is a crucial business incentive for mobile network operators (MNOs). While the MNO is capable of monitoring a vast amount of network-related ...
  • A Survey of 802.15.4 TSCH Schedulers for a Standardized Industrial Internet of Things 

    Urke, Andreas Ramstad; Kure, Øivind; Øvsthus, Knut (Peer reviewed; Journal article, 2021)
    Concepts such as Industry 4.0 and Cyber-Physical Systems may bring forward a new industrial revolution. These concepts require extensive connectivity far beyond what is provided by traditional industrial networks. The ...
  • BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem 

    Awuson-David, Kenny; Al-Hadhrami, Tawfik; Alazab, Mamoun; Shah, Nazaraf; Shalaginov, Andrii (Journal article; Peer reviewed, 2021)
    Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when, why and how a cyber adversary or an ...
  • Realizing Context-Aware Services through Intelligent Mobile Data Analysis 

    Oplenskedal, Magnus Karsten (Doctoral theses at NTNU;2022:234, Doctoral thesis, 2022)
    In recent years there has been a rapid development of mobile technologies, Internet of Things (IoT) and cellular network infrastructures. In combination with the fast evolution of data analysis, and particularly within ...
  • PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting 

    Kumar, Ajit; Agarwal, Vinti; Kumar Shandilya, Shishir; Shalaginov, Andrii; Upadhyay, Saket; Yadav, Bhawna (Peer reviewed; Journal article, 2020)
    Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. ...
  • Security Properties of Light Clients on the Ethereum Blockchain 

    Paavolainen, Santeri; Carr, Christopher (Peer reviewed; Journal article, 2020)
    Ethereum is a decentralized blockchain, known as being the second most popular public blockchain after Bitcoin. Since Ethereum is decentralised the canonical state is determined by the Ethereum network participants via a ...

View more