Now showing items 951-970 of 2577

    • Extended Presentation System (EXPRESS) 

      Jensen, Magnus; Lerdal, Dag Hendrik (Master thesis, 2008)
      Persuasion is the process of guiding people toward the adoption of an idea, attitude, or action by rational and symbolic (though not always logical) means. Persuasion is as old as humanity itself, and records exist to show ...
    • An Extensive Analysis of Email Phishing - Properties, Detection, and Successful Phishing 

      Karset, Sigrid Anne Hafsahl (Student paper, others, 2022)
      Phishing as a form of Social Engineering has a prominent presence in today’s threat landscape, and can result in devastating losses if successful. This paper presents an analysis of the phishing emails that have been ...
    • Extracting Cyber Threat Intelligence From Hacker Forums 

      Deliu, Isuf (Master thesis, 2017)
      The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive ...
    • Extraction and fusion of spectral parameters for face recognition 

      Boisier, B.; Billiot, B.; Abdessalem, Z.; Gouton, Pierre; Hardeberg, Jon Yngve (Proceedings of SPIE;7877, Journal article; Peer reviewed, 2011)
      Many methods have been developed in image processing for face recognition, especially in recent years with the increase of biometric technologies. However, most of these techniques are used on grayscale images acquired in ...
    • Face recognition in a border control environment: non-zero effort attacks' effect on false acceptance rate 

      Fladsrud, Tom (Master thesis, 2005)
      NORSK: Ansiktsgjenkjenning er en biometrisk autentiseringsmetode som har blitt mer og mer relevant de siste årene. Fra å være for unøyaktig, har det blitt en mer moden teknologi som skal brukes i det nye Visa Information ...
    • Facebook in the Physical World 

      Moen, Sverre Sveum (Master thesis, 2008)
      This thesis investigates the idea of bringing an online social community into a public space. The concept is about building a bridge between an online social community and the physical world. We built a prototype public ...
    • Facial authentication service with a privacy-preserving focus 

      Leirvaag, Aksel Skaar; Ramberg, Simen; Seiner, William Eide (Bachelor thesis, 2022)
      Mobai ønsket å utnytte sine biometriske tjenester til å bygge en OpenID Connect-leverandør med vedvarende lagring av biometriske data som både er sikkert og overholder prinsipper for personvern. Gjennom hele prosjektet ble ...
    • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics 

      Busch, Christoph; Deravi, Farzin; Frings, Dinusha; Kindt, Els; Lessmann, Ralph; Nouak, Alexander; Salomon, Jean; Achcar, Mateus; Alonso-Fernandez, Fernando; Bachenheimer, Daniel; Bethell, David; Bigun, Josef; Brawley, Matthew; Brockmann, Guido; Cabello, Enrique; Campisi, Patrizio; Cepilovs, Aleksandrs; Clee, Miles; Cohen, Mickey; Croll, Christian; Czyżewski, Andrzej; Dorizzi, Bernadette; Drahansky, Martin; Drozdowski, Pawel; Fankhauser, Catherine; Fierrez, Julian; Gomez-Barrero, Marta; Hasse, Georg; Guest, Richard; Komleva, Ekaterina; Marcel, Sebastien; Marcialis, Gian Luca; Mercier, Laurent; Mordini, Emilio; Mouille, Stefance; Navratilova, Pavlina; Ortega-Garcia, Javier; Petrovska, Dijana; Poh, Norman; Racz, Istvan; Ramachandra, Raghavendra; Rathgeb, Christian; Remillet, Christophe; Seidel, Uwe; Spreeuwers, Luuk; Strand, Brage; Toivonen, Sirra; Uhl, Andreas (Peer reviewed; Journal article, 2023)
      Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, ...
    • Factors Affecting the Willingness to Share Knowledge in the Communities of Practice 

      Agrawal, Vivek; Snekkenes, Einar Arthur (Chapter, 2017)
      The purpose of this study is to investigate various factors that can affect the willingness of the IT professionals in Norway to share their knowledge in the open communities of practice. The study is conducted through an ...
    • Factors influencing QoE of video consultations 

      Brattbak Øie, Even; Koniuch, Kamil; Cieplínska, Natalia; De Moor, Katrien (Peer reviewed; Journal article, 2021)
      During the Covid-19 pandemic, the use of videoconferencing for medical consultations between patients and general practitioners (GPs) has strongly increased. The aim of this work-in-progress paper is to investigate which ...
    • Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice 

      Agrawal, Vivek; Wasnik, Pankaj Shivdayal; Snekkenes, Einar Arthur (Chapter, 2017)
      The purpose of this study is to contribute to a better understanding of the current status of the participation of the information security professionals (ISPs) in the electronic communities of practice (eCoP) in the ...
    • Factors Influencing the Pricing Structure of Dark Fibers for Long Haul Communication 

      Reimer, Maja (Master thesis, 2018)
      The society today are becoming more and more connected. All new devices are connected to the Internet, transmitting data to the cloud making it possible for users to remotely control anything from anywhere, and virtually ...
    • Failure analysis and prediction in compound system by wavelets 

      Zerihun, Tesfaye Amare (Master thesis, 2016)
      The current overall ICT infrastructure mainly the Internet and Telecom networks can be looked upon as an ecosystem, which is the result of the cooperation between a huge number of Autonomous systems (ASes). The interconnection ...
    • Failure Impact, Availability and Cost Analysis of PONs Based on a Network Geometric Model 

      Fernandez Fernandez, Alvaro; Stol, Norvald (Journal article; Peer reviewed, 2014)
    • Failure Process Characteristics of Cloud-Enabled Services 

      Tola, Besmir; Jiang, Yuming; Helvik, Bjarne Emil (Chapter; Peer reviewed, 2017)
      The design of cloud computing technologies need to guarantee high levels of availability and for this reason there is a large interest in new fault tolerant techniques that are able to keep the resilience of the systems ...
    • Fair Airtime Allocation for Content Dissemination in WiFi-Direct-Based Mobile Social Networks 

      Mao, Zhifei; Jiang, Yuming (Chapter, 2017)
      The vast penetration of smart mobile devices provides a unique opportunity to make mobile social networking pervasive by leveraging the feature of short-range wireless communication technologies (e.g. WiFi Direct). In this ...
    • Fair Local Resource Management in Mobile Social Networks 

      Mao, Zhifei (Doctoral theses at NTNU;2018:272, Doctoral thesis, 2018)
      As 5G made its global debut at the Winter Olympics in Pyeongchang, the world is one step closer to its mass commercial deployments. However, the practical application of 5G will be limited to dense urban areas due to ...
    • Fallacies when Evaluating Digital Evidence Among Prosecutors in the Norwegian Police Service 

      Erlandsen, Tom Erik (Master thesis, 2019)
      Digitale bevis har vært en naturlig del av bevisbildet i retten i flere år, men fortsatt ser det ut til at digitale bevis skaper usikkerhetsmomenter. Rettsvesenets manglende forståelse for digitale bevis kan potensielt ...
    • Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries 

      Bassit, Amina; Hahn, Florian; Peeters, Joep; Kevenaar, Tom; Veldhuis, Raymond Nicolaas Johan; Peter, Andreas (Peer reviewed; Journal article, 2021)
      Biometric verification has been widely deployed in current authentication solutions as it proves the physical presence of individuals. Several solutions have been developed to protect the sensitive biometric data in such ...
    • Fast and Secure Updatable Encryption 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Peer reviewed; Journal article, 2020)
      Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update ...