Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 2427-2446 of 2628
-
Towards Modeling of Data in UML Activities with the SPACE Method: An Example-Driven Discussion
(Master thesis, 2008)The focus of this work is the rapid engineering method SPACE, developed at NTNU. In this method, services are modeled using UML 2.0 collaborations and activities, and from these executable code can be generated. Services ... -
Towards new privacy regulations in europe: Users' privacy perception in recommender systems
(Journal article; Peer reviewed, 2018)Despite the fact that recommender systems are becoming increasingly popular in every aspect of the web, users might hesitate to use these personalization-based services in return of their personal information if they believe ... -
Towards Optimal Distributed Node Scheduling in a Multihop Wireless Network through Local Voting
(Journal article; Peer reviewed, 2018)In a multihop wireless network, it is crucial but challenging to schedule transmissions in an efficient and fair manner. In this paper, a novel distributed node scheduling algorithm, called Local Voting, is proposed. This ... -
Towards Plug-and-Play Services: Design and Validation Using Roles
(Dr. ingeniøravhandling, 0809-103X; 2003:47, Doctoral thesis, 2003)Today telecommunication service users expect to access a similar set of services independently of what network they happen to use, they expect services to adapt to new surroundings and contexts as they move around, and ... -
Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies
(Peer reviewed; Journal article, 2020)In this paper a notion of privacy-anomaly detection is presented where normative privacy is modelled using k-anonymity. Based on the model, normative privacy-profiles are constructed, and deviation from normative privacy-profile ... -
Towards Privacy-Preserving Fingerprint Verification
(Master thesis, 2022)I kontorlokaler og ved grensekontroller blir autentisering ofte gjennomført ved bruk av fysiske ID-kort eller pass, mens i en digital setting er det som oftest autentisering med brukerdefinerte passord dersom det ikke er ... -
Towards Privacy-Preserving Fingerprint Verification
(Master thesis, 2022)I kontorlokaler og ved grensekontroller blir autentisering ofte gjennomført ved bruk av fysiske ID-kort eller pass, mens i en digital setting er det som oftest autentisering med brukerdefinerte passord dersom det ikke er ... -
Towards protected VNFs for multi-operator service delivery
(Chapter, 2019)Value-added 5G verticals are foreseen to be delivered as a service chain over multiple network operators with extensive outsourcing of Virtual Network Functions (VNFs). In this short paper we introduce the initial design ... -
Towards secure, decentralised, and privacy friendly forensic analysis of vehicular data
(Journal article; Peer reviewed, 2021) -
Towards Understanding of User Perceptions for Smart Border Control Technologies using a Fine-Tuned Transformer Approach
(Peer reviewed; Journal article, 2022)Smart Border Control (SBC) technologies became a hot topic in recent years when the European Union (EU) Commission announced the Smart Borders Package to improve the efficiency and security of the border crossing points ... -
Towards Verifying Safety Properties of Real-Time Probabilistic Systems
(Journal article; Peer reviewed, 2014)Using probabilities in the formal-methods-based development of safety-critical software has quickened interests in academia and industry. We address this area by our model-driven engineering method for reactive systems ... -
Tracing your smart-home devices conversations: A real world iot traffic data-set
(Peer reviewed; Journal article, 2020)Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ... -
Tracking the presence of users by the presence of their device
(Master thesis, 2014)Real-time locating systems (RTLS) are systems, which can automatically identify and track the objects. Such a system can be helpful at university in a way that students can find in which auditorium a professor is present ... -
Traffic data processing using large scale graph processing systems
(Master thesis, 2014)Anomaly detection in internet traffic today is largely based on quantifying traffic data.This thesis proposes a new algorithm SpreadRank, which detects spreading of internet traffic as an additional metric for traffic ... -
Traffic modeling for aggregated periodic IoT data
(Chapter, 2018)The Internet of Things (IoT) is emerging in the telecommunication sector, and will bring a very large number of devices that connect to the Internet in the near future. The expected growth in such IoT nodes necessitates ... -
Traffic Policing in Dynamic Military Networks Using Software Defined Networking
(Master thesis, 2016)This thesis looks at how Software Defined Networking (SDN) can be used to provide traffic engineering and to police traffic in an Operational Military Network (OMN). SDN is a concept where the control plane is separated ... -
Training the Trainers for Cybersecurity Exercises - Developing EXCON-teams
(Chapter, 2023)In recent years there has been a large increase in advanced computer attacks targeting Norwegian authorities and businesses. At the same time there is a great shortage of trained and qualified personnel within cyber- and ... -
Transaction Characteristics of Bitcoin
(Chapter, 2021)Blockchain has been considered as an important technique to enable secure management of networks and network-based services. To understand such capabilities of a blockchain, e.g. transaction confirmation time, demands a ... -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
(Journal article; Peer reviewed, 2022) -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
(Peer reviewed; Journal article, 2022)Most deep learning-based image classification models are vulnerable to adversarial attacks that introduce imperceptible changes to the input images for the purpose of model misclassification. It has been demonstrated that ...