Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2549-2568 av 2628
-
Utilisation of the perceived benefits of training new employees in information security
(Master thesis, 2019)Kunnskap og opplæring er en avgjørende del av å skape en bevissthet rundt informasjonssikkerhet og å skape atferdsendring. I Norge er det ingen opplæring eller utdanning i informasjonssikkerhet på skolen eller som på andre ... -
Utilization of ServiceNow’s Risk Management Functionality Within the GRC Module: A Case Study
(Master thesis, 2023)I en tid med økende kompleksitet og risiko, er styring av governance, risk, and compliance (GRC) innen organisasjoner mer kritisk enn noen gang. Denne masteroppgaven undersøker potensialet til ServiceNow's GRC-modul og et ... -
Utilizing Connectivity Maps to Accelerate V2I Communication in Cellular Network Dead Spots
(Peer reviewed; Journal article, 2020)On many roads in rural and mountainous areas, the cellular network connectivity is intermittent and dead spots, i.e., zones without any coverage, are frequent. In previous work, we developed a data dissemination protocol ... -
Utilizing Distributed Multimedia Plays for Networked Virtual Shopping
(Master thesis, 2012)This thesis studies the market of e-commerce and a futuristic solution to shopping by utilizing the Distributed Multimedia Plays network architecture and its Collaboration Space, which provides users with a near natural ... -
V0609 Forretningspotensial for lokasjonsbasert reklame
(Master thesis, 2009)Interessen for personalisering av tjenester har i de siste årene økt betraktelig. Kundene forventer mer av tjenestetilbyderen enn tidligere. En tjeneste skal ikke lenger være generisk, men tilpasset hver enkelt kundes ... -
Valuable Puzzles for Proofs-of-Work
(Journal article; Peer reviewed, 2018)Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One ... -
Valuation of Situated Services
(Master thesis, 2006)Situated services is an area that is believed to have high business potential for mobile communities. The aim of this study is to investigate whether this hypothesis can be justified or not, by investigating the potential ... -
Value chain security - Effects of soft governance on businesses for requirements to suppliers in ICT-security
(Master thesis, 2020)Det er uklart om regjeringen har fulgt opp tiltakene for anskaffelser for å håndtere sårbarheter i verdikjeden og om de foreslåtte tiltakene benyttes av virksomheter.Forskning har vist at mange kritiske funksjoner i samfunnet ... -
Value of Information in Wireless Sensor Network Applications and the IoT: A Review
(Journal article; Peer reviewed, 2022)Value of Information (VoI) is a concept to assess the usefulness of information for a specific goal, and has in the last decade experienced a growing interest also for Wireless Sensor Network (WSN) applications and the ... -
Value of Investing in Information Security: A metastudy initiated by norSIS
(Master thesis, 2007)The ratio of companies and organizations in Norway with a number of employees between 5 and 9 and Internet access increased from 66% to 86% during a five year period from 2001 to 2006. This increased use of the Internet ... -
Variantbegrensning av IKT-systemer i Forsvaret – krefter og motkrefter
(Master thesis, 2023)Forsvaret har fått kraftig kritikk på flere områder innenfor informasjons- og kommunikasjonsteknologi (IKT), blant annet for manglende måloppnåelse når det gjelder å redusere antall IKT-systemer og øke evnen til samhandling. ... -
Variantbegrensning av IKT-systemer i Forsvaret – krefter og motkrefter
(Master thesis, 2023)Forsvaret har fått kraftig kritikk på flere områder innenfor informasjons- og kommunikasjonsteknologi (IKT), blant annet for manglende måloppnåelse når det gjelder å redusere antall IKT-systemer og øke evnen til samhandling. ... -
Variational Approach for Capsule Video Frame Interpolation
(Journal article; Peer reviewed, 2018)Capsule video endoscopy, which uses a wireless camera to visualize the digestive tract, is emerging as an alternative to traditional colonoscopy. Colonoscopy is considered as the gold standard for visualizing the colon and ... -
Vascular Pattern Recognition: And its Application in Privacy-Preserving Biometric Online-Banking Systems
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;2/2012, Doctoral thesis, 2012-10-04)Authentication is a key building block in security systems and many applications to prevent access to information, services, assets or locations for non-authorized persons or processes. Common methods based on knowledge ... -
Vehicular Fog/Edge Computing to improve dependability and performance
(Master thesis, 2020)We have more and more objects connected to the network. These objects need local information increasingly. This means that cloud computing is not suitable in some applications. This is also due to the high latency that it ... -
Vein Pattern Recognition Using Chain Codes, Spatial Information and Skeleton Fusing
(Chapter; Peer reviewed, 2012)Vein patterns are a unique attribute of each individual and can therefore be used as a biometric characteristic. Exploiting the specific near infrared light absorption properties of blood, the vein capture procedure is ... -
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
(Journal article; Peer reviewed, 2023)Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia. Practical protocols usually rely on tested ... -
VerifyMed - Application of blockchain technology to improve trust in virtualized healthcare services
(Master thesis, 2020)Helsevesenet går mot økt bruk av digitale helsetjenester. Ved å bruke slike tjenester kan pasienter møte helsepersonell ved bruk av nettbaserte applikasjoner, for eksempel via digitale konsultasjoner på video eller chat. ... -
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept
(Chapter, 2020)Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to ... -
Verktøy for helhetlig risikostyring og informasjonssikkerhet: Bruk av Return on Security Investment for kost/nytte-analyse av investeringer i informasjonssikkerhet
(Master thesis, 2008)Investeringer i informasjonssikkerhet utgjør i dag en stor del av organisasjoners investeringer. På bakgrunn av dette er det økende etterspørsel etter kost/nytte-analyser for investeringer i informasjonssikkerhet. ...