Now showing items 1107-1126 of 2627

    • HEBI: Homomorphically Encrypted Biometric Indexing 

      Bauspieß, Pia; Grimmer, Marcel; Fougner, Cecilie; Le Vasseur, Damien; Stöcklin, Thomas Thaulow; Rathgeb, Christian; Kolberg, Jascha; Costache, Anamaria; Busch, Christoph (Chapter, 2023)
      Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ...
    • Hendelseshåndtering i små og mellomstore bedrifter 

      Sand, Lars Arne; Wangen, Gaute Bjørklund; Frogner, Anders Sand (Bachelor thesis, 2010)
      Hendelseshåndtering er et spennende og viktig tema innenfor informasjonssikkerhet. Det finnes en del faglitteratur om emnet, men kunnskapen om hvordan hendelseshåndtering anvendes er ikke godt kartlagt. Det var derfor ...
    • Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU 

      Singh, Jag Mohan; Wasnik, Pankaj Shivdayal; Ramachandra, Raghavendra (Chapter, 2018)
      In recent years, the Ray Tracing of Implicit Surfaces on a GPU has been studied by many researchers. However, the existing methods have challenges that mainly includes solving for self-intersecting surfaces. General solutions ...
    • Heterogeneous Preferences and Patterns of Contribution in Cybersecurity as a Public Good 

      Kianpour, Mazaher (Chapter, 2021)
      This paper presents an agent-based model of contribution to cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information ...
    • High level information security risk in higher education 

      Ulven, Joachim (Master thesis, 2020)
      Identifisere verdier, trusler og sårbarheter er avgjørende når du vurderer risikoer i organisasjoner. Flere av de mest kjente informasjonssikkerhetsrisiko rammeverkene som ISO/IEC 27005, NIST SP 800-39 og OCTAVE bruker ...
    • Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks 

      Gray, Nicolas; Grigorjew, Alexej; Hossfeld, Tobias; Apoorv, Shukla; Zinner, Thomas Erich (Chapter, 2019)
      Modern networks increasingly rely on Software-defined Networking (SDN) and Network Function Virtualization (NFV) to augment their flexibility in high load scenarios. To further enhance the performance, a part of the ...
    • HIKOS - Highly Secure, Intelligent Software Copy-Protection 

      Veseli, Fatbardh (Master thesis, 2011)
      Software piracy, which includes reproducing and distributing software products illegaly and without authorization, continues to cause financial losses to software vendors. Dongles for hardware protection have been present ...
    • Hip movement based authentication: how will imitation affect the results? 

      Buvarp, Tor Erik (Master thesis, 2006)
      NORSK: Denne oppgaven vil se på en metode innen biometrisk autentisering som er ganske ny innen denne type forskning. Metoden tar for seg autentisering av en person ved å registrere hofte bevegelsen i løpet av ordinær ...
    • Holding on to Compliance While Adopting DevSecOps: An SLR 

      Ramaj, Xhesika; Sanchez Gordon, Mary Luz; Gkioulos, Vasileios; Chockalingam, Sabarathinam; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2022)
      The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ...
    • A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda 

      Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ...
    • A Holistic Approach to Dependability Modeling and Analysis of Smart Distribution Grids 

      Zerihun, Tesfaye Amare (Doctoral theses at NTNU;2021:56, Doctoral thesis, 2021)
      Lately, the distribution grid has been under a significant transformation, with a pervasive integration of Information and Communication Technology (ICT) for an enhanced operation and management of the grid. Some of the ...
    • Honey Templates: a Protection Mechanism for Biometric Systems 

      Martiri, Edlira (Doctoral theses at NTNU;2022:20, Doctoral thesis, 2022)
    • Honey-list based authentication protocol for industrial IoT swarms 

      El-Zawawy, Mohamed A.; Kaliyar, Pallavi; Conti, Mauro; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
      Industrial Internet of Things (IIoT) systems are advanced IoT systems composed of sensor devices supported with dynamic objects such as smart vehicles and drones. The collaboration among static and heterogeneous mobile ...
    • Hop-by-hop TCP communication as a network function - A proof-of-concept implementation 

      Kvamtrø, Knut Magnus (Master thesis, 2017)
      Techniques for enabling resilient network communication over less-than- optimal communication links were studied. A testbed for low-level network behavior and link characteristic emulation was created using QEMU- virtualized ...
    • How a Control Plane Policed DDoS Attack Impacts the Latency of Time-Critical Offshore IoT Traffic 

      Bruleite, Hanne Malmin (Master thesis, 2020)
      5G har nylig blitt introdusert, noe som vil gjøre det mulig å bruke tids-kritiske applikasjoner som har strenge krav til pålitelighet og forsinkelse. Applikasjoner som har slike krav er også kjent som applikasjoner som ...
    • How cyber security incidents can affect Norwegian food production 

      Kjønås, Karianne (Master thesis, 2023)
      Cybersikkerhet i landbruket blir mer og mer viktig fra et samfunnsikkerhetsperspektiv fordi matforsyningen kan være et mål for nasjonale trusler. Bruken av teknologi i landbruket har økt med årene, som fører til en økning ...
    • How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection? 

      Lee, Ming-Chang; Lin, Jia-Chun; Gran, Ernst Gunnar (Chapter, 2021)
      Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion detection, etc. ...
    • How Moving from Traditional Signature Analysis to Automatic Anomaly Analysis Affects User Experience and Security Awareness 

      Selte, Caroline Stensland (Master thesis, 2020)
      Tradisjonelt har sikkerhetsmonitorering vært regelbasert, men når blir det tatt i bruk maskinlæringsteknologi for å forbedre sikkerhetssystemene. E-postløsninger er blant systemene som bruker den nye teknologien. Dette er ...
    • How re-training process affect the performance of no-reference image quality metric for face images 

      Liu, Xinwei; Charrier, Christophe; Pedersen, Marius; Bours, Patrick (Journal article; Peer reviewed, 2019)
      The accuracy of face recognition systems is significantly affected by the quality of face sample images. There are many existing no-reference image quality metrics (IQMs) that are able to assess natural image quality by ...
    • How safe are children on online social platforms 

      Afzal, Hussein; Afzal, Hassen; Nimalmohan, Madhushan; Abdulle, Mohamed K Hassan (Bachelor thesis, 2021)
      Denne rapporten er en vurdering og evaluering av tryggheten til barn som er på sosiale plattformer, for denne oppgaven inkluderer det Moviestarplanet, Roblox, Snapchat og TikTok. Metoden for å gjennomføre analysen er basert ...