Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 627-646 of 2627
-
Cybersecurity Training in Norwegian Critical Infrastructure Companies
(Journal article; Peer reviewed, 2022)Human preparedness is a critical aspect of critical infrastructure (CI) cybersecurity. Many efforts, including educational curricula and training programs, have been taken at both national and company level to ensure human ... -
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry
(Journal article; Peer reviewed, 2023)Information security policies are formalized rules and regulations that employees should follow to avoid unwanted cyber incidents. This paper reports on the findings of a survey among personnel employed in the Norwegian ... -
CyberTest4You: A three-way Model for Evaluating Compliance and General Maturity in IT Security
(Bachelor thesis, 2023)Sopra Steria er et anerkjent multinasjonalt konsulentselskap innenfor digitalisering. En del av jobben deres er å hjelpe selskaper til å overholde lokale og internasjonale regler og standarder innenfor og IT-sikkerhet og ... -
Cyberwindow
(Bachelor thesis, 2022)Denne oppgaven omhandler utviklingen av en webapplikasjon med formål om å hente informasjon fra de forskjellige fagapplikasjonene til NTNU SOC sine APIer, for å så fremstille de grafisk på en oversiktlig måte. Oppgaven kom ... -
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction
(Chapter, 2020)Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detectors are ... -
Dashboard for Quality of Experience Studies of WebRTC Based Video Communication
(Master thesis, 2016)WebRTC-based applications and services have become more and more popular over the last years. These types of applications support Real-Time Communication (RTC) with audio, video and sometimes also data sharing. WebRTC-based ... -
Data Access Interface for Innovation on Earth-observation Data
(Master thesis, 2016)European Union (EU) adopted an open data policy for the Sentinel constellation of the Copernicus program in 2013. The Copernicus program is now about to transition into its operational phase, which means that it is from ... -
Data Anonymization for Research
(Master thesis, 2019)Implementeringen av GDPR får bedrifter til å revurdere deres måte å lagre brukerdata. Forskere trenger realistiske data for å kunne oppnå best mulige resultater. Selv med strenge regler fra GDPR mot å dele og lagre personlig ... -
Data Dissemination for Vehicles in Temporary Cellular Network Dead Spots
(Journal article, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
Data Visualization for Discovery of Digital Evidence in Email
(Master thesis, 2014)Digital recordings of our activities are constantly being stored and processed in information systems, and are increasingly getting more valuable for investigating illegal activities. A problem we are facing today is the ... -
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review
(Peer reviewed; Journal article, 2020)Data breaches in healthcare continue to grow exponentially, calling for a rethinking into better approaches of security measures towards mitigating the menace. Traditional approaches including technological measures, have ... -
Data-driven Approach to Information Sharing using Data Fusion and Machine Learning
(Master thesis, 2016-08-31)The number of security incidents worldwide is increasing, and the capabilities to detect and react is of uttermost importance. Intrusion Detection Systems (IDSs) are employed in various locations in networks to identify ... -
Data-driven Intrusion Detection System for Small and Medium Enterprises
(Journal article; Peer reviewed, 2019)Small and Medium Enterprises (SMEs) have become targets of attack by cyber criminals in resent times. This paper therefore aim to address awareness and challenges of SMEs related to IDSs as the most important defense tool ... -
Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow
(Chapter, 2021)Human action recognition is a very challenging problem due to numerous variations in each body part. In this paper, we propose a method for extracting optical flow information from skeleton data to address the problem of ... -
Data-driven Machine Learning Model in District Heating System for Heat Load Prediction: A Comparison Study
(Journal article; Peer reviewed, 2016)We present our data-driven supervised machine-learning (ML) model to predict heat load for buildings in a district heating system (DHS). Even though ML has been used as an approach to heat load prediction in literature, ... -
Databases fit for blockchain technology: A complete overview
(Journal article; Peer reviewed, 2022)Efficient data storage and query processing systems play a vital role in many different research areas. Blockchain technology and distributed ledgers attract massive attention and trigger multiple projects in various ... -
Datakriminalitet i Norge: de mørke tallene
(Master thesis, 2007)NORSK: Bruken av Internett har ført til en globalisering av datakriminalitet. I økende grad er det ressurssterke organiserte miljøer som står bak de alvorligste sakene. Dagens teknologi gjør det mulig å gjennomføre ... -
Datalagringsdirektivet
(Master thesis, 2009)Datalagringsdirektivet EU 2006/24/EF har til hensikt å harmonisere lovgivningen som gjelder lagring av trafikkdata gjennom hele EU området, og gjennom dette gjøre medlemslandene bedre rustet til å bekjempe alvorlig ... -
The Dawn of the Human-Machine Era: A forecast of new and emerging language technologies
(Research report, 2021)New language technologies are coming, thanks to the huge and competing private investment fuelling rapid progress; we can either understand and foresee their effects, or be taken by surprise and spend our time trying to ... -
DDoS attacks and Countermeasures
(Master thesis, 2010)Internet has grown leaps and bounds over the last few decades. Internet's phenomenal growth it has attracted users with malicious intent. Distributed Denial of Service (DDoS) attacks have become very common these days. The ...