Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2407-2426 av 2543
-
Us against the World: Detection of Radical Language in Online Platforms
(Journal article; Peer reviewed, 2021) -
Usability and security in a messaging prototype for mobile phones
(Master thesis, 2007)NORSK: SMS meldinger i dagens GSM nettverk er ikke a betrakte som sikre. Denne masteroppgaven vil undersøke spørsmål knyttet til brukeropplevelser av en prototype for sikre meldinger på mobiltelefoner. Vi har gjennomført ... -
Usability, Security, and Privacy Recommendations for Mobile Parental Control
(Chapter, 2023)Current mobile parental control aids parents in monitoring their children’s digital usage. Although many children are below 13 when receiving their first smartphone and social media accounts, only a few parents adopt such ... -
Use of Authentication Mechanisms and Biometrics in Norwegian Industry
(Master thesis, 2010)This thesis will estimate use of authentication mechanism and biometric systems used in Norwegian industry. We will investigate how different factors influence the usage and application of authentication/identification ... -
Use of cyber attack and defense agents in cyber ranges: A case study
(Peer reviewed; Journal article, 2022)With the ever-changing cybersecurity landscape, the need for a continuous training for new cybersecurity skill sets is a requirement. Such continuous training programs can be delivered on platforms like cyber ranges. Cyber ... -
The use of d-truncated Gröbner bases in cryptanalysis of symmetric ciphers
(Master thesis, 2010)ENGELSK: Solving systems of multivariate polynomial equations is hard, even NP-hard in the general case. The method of Göbner bases can be used to solve such systems, and thus has a running time complexity at least that ... -
The Use of Frequent Episodes in Intrusion Detection
(Master thesis, 2009)In today’s intrusion detection systems (IDSs), a trade-off between efficiency and accuracy must be achieved. Because of that, the decision on structures for representing patterns of normal and intrusive behavior are of ... -
Use of Gamification in Security Awareness and Training Programs
(Master thesis, 2016)The security reports are unambiguous: the human factor constitutes a real vulnerability in the information security domain. It is crucial that employees of companies and governments understand the risks and threats connected ... -
The use of k-best paths algorithms in clock control sequence reconstruction
(Master thesis, 2006)NORSK: Nøkkelstraumgeneratorar som er baserte på klokkekontrollerte lineært tilbakekopla skiftregister blir ofte brukte i fytchiffer-system. Kryptoanalyse av slike generatorar kan delast inn i to etappar: Den første ... -
The use of Levenshtein distance in computer forensics
(Master thesis, 2005)NORSK: Vi benytter oss av datateknologi i stadig størrre grad, og denne teknologien er i ferd med å bli en viktig del av vår hverdag. Bruk av denne teknologien åpner opp mange nye muligheter, men kan også misbrukes til ... -
Use of Messaging Layer Security in a Military UAV Swarm
(Master thesis, 2023)Forskning på flyvende dronesvermer har fått betydelig interesse de siste årene. En militær dronesverm kan utføre risikofylte oppdrag med lavere risiko for personellet, men introduserer en økt risiko for at fienden ... -
Use of Serious Games to Incorporate Security Awareness Programs with Skills Training
(Master thesis, 2020)The purpose of this study is to determine the possibility of addressing the shortcoming of Security Awareness training in providing Skills training. The study will also determine if it is possible to create a Serious Game ... -
User Authentication in Multi-mode Mobile Phones
(Master thesis, 2007)IMS-WLAN interworking is a step towards extending IMS functionality into other access technologies, but this architecture is very comprehensive and is unlikely to be employed everywhere. The result is a need for alternative ... -
User Engagement in Game-based Student Response Systems: A Case Study on Kahoot!
(Master thesis, 2018)Among all the new applications and services coming, are technological tools one can benefit from, in fields such as educational environments. The increased use of technology in schools has opened up for new ways of learning, ... -
User Engagement with Snapchat: Exploring the Influence of Technical Factors
(Master thesis, 2018)The use of digital services has become part of peoples' everyday lives. Research on how people use and engage with these services has become increasingly important. User engagement is a concept that has gained prominence ... -
User Experience and Technical Solutions for Location Based Push Commercials
(Master thesis, 2014)This project focuses on the creation of an Android app for location based push commercials, which henceforth will be called an offers app. The idea of the app is the following: Users are allowed to chose which ac- tors ... -
User Friendly Access Solutions for Mobile WiMAX
(Master thesis, 2009)Today, WiMAX networks are deployed several places worldwide. To get access to these networks, users have to buy equipment specialized for one operator with a subscription. User equipment has earlier been stationary or ... -
User Interface Design for Privacy Enhancing Technology
(Master thesis, 2012)A significant amount of information is available of us online due to the increased use of the Internet and online services. It appears to be a tendency among users to not read privacy policies when creating user accounts ... -
User interface evaluation of a ski injuries management system
(Journal article; Peer reviewed, 2017)Although many technological devices and solutions to enhance the skiing experience are now available for skiers, skiing sometimes could turn to be potentially dangerous. The speed of movement, environment unpredictability, ... -
User Modeling Validation Over the Security Awareness of Digital Natives
(Journal article; Peer reviewed, 2017)Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices ...