Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2344-2363 av 2531
-
Towards protected VNFs for multi-operator service delivery
(Chapter, 2019)Value-added 5G verticals are foreseen to be delivered as a service chain over multiple network operators with extensive outsourcing of Virtual Network Functions (VNFs). In this short paper we introduce the initial design ... -
Towards secure, decentralised, and privacy friendly forensic analysis of vehicular data
(Journal article; Peer reviewed, 2021) -
Towards Understanding of User Perceptions for Smart Border Control Technologies using a Fine-Tuned Transformer Approach
(Peer reviewed; Journal article, 2022)Smart Border Control (SBC) technologies became a hot topic in recent years when the European Union (EU) Commission announced the Smart Borders Package to improve the efficiency and security of the border crossing points ... -
Towards Verifying Safety Properties of Real-Time Probabilistic Systems
(Journal article; Peer reviewed, 2014)Using probabilities in the formal-methods-based development of safety-critical software has quickened interests in academia and industry. We address this area by our model-driven engineering method for reactive systems ... -
Tracing your smart-home devices conversations: A real world iot traffic data-set
(Peer reviewed; Journal article, 2020)Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ... -
Tracking the presence of users by the presence of their device
(Master thesis, 2014)Real-time locating systems (RTLS) are systems, which can automatically identify and track the objects. Such a system can be helpful at university in a way that students can find in which auditorium a professor is present ... -
Traffic data processing using large scale graph processing systems
(Master thesis, 2014)Anomaly detection in internet traffic today is largely based on quantifying traffic data.This thesis proposes a new algorithm SpreadRank, which detects spreading of internet traffic as an additional metric for traffic ... -
Traffic modeling for aggregated periodic IoT data
(Chapter, 2018)The Internet of Things (IoT) is emerging in the telecommunication sector, and will bring a very large number of devices that connect to the Internet in the near future. The expected growth in such IoT nodes necessitates ... -
Traffic Policing in Dynamic Military Networks Using Software Defined Networking
(Master thesis, 2016)This thesis looks at how Software Defined Networking (SDN) can be used to provide traffic engineering and to police traffic in an Operational Military Network (OMN). SDN is a concept where the control plane is separated ... -
Training the Trainers for Cybersecurity Exercises - Developing EXCON-teams
(Chapter, 2023)In recent years there has been a large increase in advanced computer attacks targeting Norwegian authorities and businesses. At the same time there is a great shortage of trained and qualified personnel within cyber- and ... -
Transaction Characteristics of Bitcoin
(Chapter, 2021)Blockchain has been considered as an important technique to enable secure management of networks and network-based services. To understand such capabilities of a blockchain, e.g. transaction confirmation time, demands a ... -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
(Journal article; Peer reviewed, 2022) -
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
(Peer reviewed; Journal article, 2022)Most deep learning-based image classification models are vulnerable to adversarial attacks that introduce imperceptible changes to the input images for the purpose of model misclassification. It has been demonstrated that ... -
Transforming Collaborative Service Specifications into Efficiently Executable State Machines
(Journal article; Peer reviewed, 2007)We describe an algorithm to transform UML 2.0 activities into state machines. The implementation of this algorithm is an integral part of our tool-supported engineering approach for the design of interactive services, in ... -
Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic
(Chapter, 2021)Network slicing enabled by fifth generation (5G) systems has the potential to satisfy diversified service requirements from different vertical industries. As a typical vertical industry, smart distribution grid poses new ... -
Transparent Adaptable Network Access and Service Content Differentiation
(Master thesis, 2006)Today s most advanced mobile devices support communication through a variety of network technologies; GSM (including GPRS and EDGE), UMTS, WLAN, Bluetooth, and IR. This master thesis characterizes different network ... -
Treasure Hunt Components
(Master thesis, 2012)The development of distributed, reactive and collaborative services is quite challenging. Rapidly composing services for collaborative learning activities require some development methods and tools. This thesis presents ... -
Trends in Development of Databases and Blockchain
(Chapter, 2020)This work is about the mutual influence between two technologies: Databases and Blockchain. It addresses two questions: 1. How the database technology has influenced the development of blockchain technology?, and 2. How ... -
Triage of PE-files through divide-and-conquer clustering
(Master thesis, 2020)Antallet nye, unike ondsinnede filer som oppdages hver dag øker stadig. Grunnen til at det oppdages så mange nye filer, er ikke at det lages så mange helt nye varianter av skadevare hver dag, men fordi små endringer blir ... -
Trust Management for a Smart Card Based Private eID Manager
(Master thesis, 2016)Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ...