Now showing items 1264-1283 of 2536

    • Is the Session Mix-up Attack on the UMTS/LTE AKA Protocol Practical? 

      Bhusal, Ashim (Master thesis, 2013)
      Tsay and Mjølsnes [1, 2, 3] have detected a protocol-level security vulnerability in the specifications of the Authentication and Key Agreement (AKA) protocols of the GSM/UMTS/LTE family of mobile network systems. It is ...
    • Isolated Handwritten Character Recognition of Ancient Hebrew Manuscripts 

      Lumban Tobing, Tabita; Yildirim Yayilgan, Sule; George, Sony; Elgvin, Torleif (Journal article, 2022)
      Character recognition is widely considered an essential factor in preserving and digitizing historical handwritten documents. While it has shown a significant impact, the character recognition of historical handwritten ...
    • The Isolation Concept in the 5G Network Slicing 

      Gonzalez, Andres J.; Ordonez-Lucena, Jose; Helvik, Bjarne Emil; Nencioni, Gianfranco; Xie, Min; Lopez, Diego R.; Grønsund, Pål R. (Chapter, 2020)
      The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ...
    • It is about time–Do exFAT implementations handle timestamps correctly? 

      Nordvik, Rune; Axelsson, Stefan (Peer reviewed; Journal article, 2022)
      Digital forensic investigations require that file metadata are interpreted correctly. In this paper we focus on the timestamps of the exFAT file system. How these timestamps are written may depend on the implementation of ...
    • IT Risk Assessment Automation in Healthcare Networks 

      del Riego San Martín, Daniel (Master thesis, 2022)
      Cybersecurity has become a hot topic lately because of its importance in almost every industry. However, it has not been given the same relevancy everywhere and healthcare is an example. Millions of new devices have been ...
    • IT-sikkerhetsberedskapsøvelser i smartgrids 

      Graffer, Ingrid (Master thesis, 2015)
      Overgangen fra tradisjonelt strømnett til smartgrids introduserer teknologi som gjør at både kunder og produsenter kan bruke og generere strøm på en mer effektiv måte. Fordelene ved smartgrids er mange, men det fører også ...
    • ITS using LEGO Mindstorm 

      Overskeid, Kristian M (Master thesis, 2015)
      Intelligent Transport Systems (ITS) is a general term for information-and commuication systems aimed at making the transport sector more safe, efficient and environmentally friendly. During the recent years, cars have been ...
    • Java Implementation and Performance Analysis of 14 SHA-3 Hash Functions on a Constrained Device 

      Knutsen, Mats; Martinsen, Kim-André (Master thesis, 2010)
      Several of the widely used cryptographic hash functions in use today are under attack. With the need to maintain a certain level of security, NIST is in the process of selecting new cryptographic hash function(s). Through ...
    • Joint head selection and airtime allocation for data dissemination in mobile social networks 

      Mao, Zhifei; Jiang, Yuming; Di, Xiaoqiang; Woldeyohannes, Yordanos Tibebu (Peer reviewed; Journal article, 2020)
      By forming a temporary group, users in mobile social networks (MSNs) can disseminate data to others in proximity with short-range communication technologies. However, due to user mobility, airtime available for users in ...
    • Keeping Connected in Internet-Isolated Locations 

      Skaug, Kirsten Lunde; Smebye, Elise Breivik (Master thesis, 2021)
      I områder rammet av naturkatastrofer, på folksomme konserter og i rurale områder, kan sosiale medier og chatte applikasjoner som krever internettforbindelse bli utilgjengelige. Uten tilkobling til internett blir brukerne ...
    • Keeping Connected in Internet-Isolated Locations 

      Skaug, Kirsten Lunde; Smebye, Elise Breivik; Tola, Besmir; Jiang, Yuming (Chapter, 2022)
    • Keeping Connected in InternetIsolated Locations 

      Skaug, Kirsten Lunde; Smebye, Elise Breivik (Master thesis, 2021)
      I områder rammet av naturkatastrofer, på folksomme konserter og i rurale områder, kan sosiale medier og chatte applikasjoner som krever internettforbindelse bli utilgjengelige. Uten tilkobling til internett blir brukerne ...
    • Keeping Connected When the Mobile Social Network Goes Offline 

      Sigholt, Øystein Løkken; Tola, Besmir; Jiang, Yuming (Chapter, 2019)
      WiFi Direct is an embedded technology in a vast majority of smartphone devices running the Android operating system. As a result, it represents a promising technology that can be exploited in re-establishing connectivity ...
    • Keeping Connected When the Mobile Social Network Goes Offline 

      Sigholt, Øystein Løkken (Master thesis, 2019)
      Dette prosjektets mål er å foreslå, implementere og teste en teknikk som sosiale smarttelefonapplikasjoner kan bruke for å koble sammen brukere i situasjoner der de ikke er i stand til å nå applikasjonsserveren, men nær ...
    • Keeping Connected When the Mobile Social Network Goes Offline 

      Sigholt, Øystein Løkken; Tola, Besmir; Jiang, Yuming (Journal article; Peer reviewed, 2019)
      WiFi Direct is an embedded technology in a vast majority of smartphone devices running the Android operating system. As a result, it represents a promising technology that can be exploited in re-establishing connectivity ...
    • Keeping connected without the Internet backbone 

      Berbom, Sigmund Bernhard; Mæland, Endre Medhus (Master thesis, 2022)
      Store deler av dagens digitale kommunikasjon er avhengig av en eller flere sentrale enheter som kan sørge for sikker kommunikasjon. Slike enheter er ofte utilgjengelige når internett er utilgjengelig. Utilgjengeligheten ...
    • Keeping connected without the Internet backbone 

      Mæland, Endre Medhus; Berbom, Sigmund Bernhard (Master thesis, 2022)
      Store deler av dagens digitale kommunikasjon er avhengig av en eller flere sentrale enheter som kan sørge for sikker kommunikasjon. Slike enheter er ofte utilgjengelige når internett er utilgjengelig. Utilgjengeligheten ...
    • Kernighan-Lin heuristic in an IDS 

      Smestad, Mats Erik (Master thesis, 2006)
      NORSK: Organisasjoner og bedrifter i dag krever å være online og koblet til Internet. Dette stiller høye sikkerhetskrav. I perimetersikring for organisasjonen er Intrusion Detection System, IDS, et viktig element. Men ...
    • Key Competencies for Critical Infrastructure Cyber-Security: a Systematic Literature Review 

      Chowdhury, Nabin; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Purpose The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical infrastructure (CI) cyber-security (CS) ...
    • Key factors in making Information Security Policies Effective 

      Wold, Gullik (Master thesis, 2004)
      NORSK: Målet med denne oppgaven har vært å finne frem til nøkkelfaktorer som kjennetegner en effektiv policy for informasjonssikkerhet. Utfordringen har vært å finne frem til hva vi ikke vet og ikke forstår i arbeidet ...