Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1716-1735 av 2542
-
Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes
(Journal article; Peer reviewed, 2019)A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized ... -
Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm
(Journal article; Peer reviewed, 2020)The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains ... -
Practical Isogeny-Based Key-Exchange with Optimal Tightness
(Journal article; Peer reviewed, 2021)We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ... -
Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification
(Peer reviewed; Journal article, 2021)Skin cancer is a major public health problem, with millions newly diagnosed cases each year. Melanoma is the deadliest form of skin cancer, responsible for the most over 6500 deaths each year in the US, and the rates have ... -
Precision Time Protocol under Synchronization Attack
(Master thesis, 2022)Precision Time Protocol IEEE 1588 (PTP) er en synkroniserings protokoll som brukes mye i industrielle kontroll systemer hvor man ønsker en synkroniserings presisjon under et nanosekund(< 0.000001 sekunder). Denne protokollen ... -
Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
(Chapter, 2019)The primary purpose of this study is to demonstrate how publicly observable pieces of information can be used to build various psychological profiles that can be utilized for the prediction of behavior within a risk analysis ... -
Predicting likelihood of legitimate data loss in email DLP
(Journal article; Peer reviewed, 2019)The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ... -
Predicting the Performance of a Spatial Gamut Mapping Algorithm
(Proceedings of SPIE;7241, Journal article; Peer reviewed, 2009)Gamut mapping algorithms are currently being developed to take advantage of the spatial information in an image to improve the utilization of the destination gamut. These algorithms try to preserve the spatial informa- ... -
Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review
(Peer reviewed; Journal article, 2021)Atrial Fibrillation (AF) is a type of arrhythmia characterized by irregular heartbeats, with four types, two of which are complicated to diagnose using standard techniques such as Electrocardiogram (ECG). However, and ... -
Prediksjon av feil i det norske strømnettet
(Master thesis, 2019)Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ... -
Prediksjon av feil i det norske strømnettet
(Master thesis, 2019)Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ... -
Preface
(Lecture Notes in Computer Science;, Chapter, 2015)Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often ... -
Prefrontally modulated vagal neuroimmunomodulation is associated with telomere length
(Peer reviewed; Journal article, 2022)Background: Accumulated senescent cells are proposed to be one of the main drivers of age-related pathology such as dementia and cancer through disruption of tissue structure and function. We recently proposed the ... -
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
(Chapter, 2019)Learning software security is a big challenging task in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The traditional ... -
Preparedness Exercises for Cyber Attacks Against Industrial Control Systems in the Petroleum Industry
(Master thesis, 2021)I petroleumsindustrien monitoreres og kontrolleres operasjoner av industrielle automasjons- og kontrollsystemer (IACS), også kjent som operasjonell teknologi (OT). IACS er kritisk for operasjonen av plattformen og for å ... -
Preparedness Exercises for Cyber Attacks Against Industrial Control Systems in the Petroleum Industry
(Master thesis, 2021)I petroleumsindustrien monitoreres og kontrolleres operasjoner av industrielle automasjons- og kontrollsystemer (IACS), også kjent som operasjonell teknologi (OT). IACS er kritisk for operasjonen av plattformen og for å ... -
Preparing for cyber crisis management exercises
(Chapter, 2020)In this paper the authors discuss how to create a preparation schedule for ex-ercises (PSE) to support EXCON-teams and instructors for full-scaled com-bined crisis management and cyber-exercises. The process to create the ... -
Preparing for cyber-incident exercises: Developing best practice within exercise control management (EXCON)
(Master thesis, 2022)Sammendrag De siste årene har det vært en stor økning i avanserte dataangrep mot både offentlige etater og private organisasjoner i Norge, noe som har ført til økt fokus på kompetanseheving og øving innen cyber- og ... -
Presentation Attack and Detection in Keystroke Dynamics
(Master thesis, 2017)Biometric authentication is already making an entry in consumer security, notably with face and fingerprint recognition. Keystroke dynamics is an aspect of behavioral biometrics based on typing behavior to verify the ... -
Presentation Attack Resistant Fingerprint Biometrics –using Optical Coherence Tomography
(Doctoral theses at NTNU;2018:17, Doctoral thesis, 2018)