Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 934-953 av 2628
-
Evolution of the SIM to eSIM
(Master thesis, 2013)Abstract Every GSM (Global System for Mobile Communications) phone, also called 2G mobile phone and every UMTS (Universal Mobile Telecommunications System) phone, aka 3G mobile phone requires a smart card to connect and ... -
Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
(Chapter, 2017)Neural Networks have been successfully used in different fields of Information Security such that network intrusion detection and malware analysis because of ability to provide high level of abstraction for complex and ... -
Examining the suitability of industrial safety management approaches for information security incident management
(Journal article; Peer reviewed, 2016) -
Exercise Games for Elderly People: Identifying important aspects, specifying system requirements and designing a concept
(Master thesis, 2013)The aim of this study is to identify important aspects of an exergame for elderly, and based on this, specify system requirements and develop a concept for an exergame. Due to "baby boomers" and the fact that people live ... -
Expanded combinatorial designs as tool to model network slicing in 5G
(Journal article; Peer reviewed, 2019)The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into ... -
Expanding the Capabilities of Cyber Range Attack Agents
(Master thesis, 2022)Enheter knyttet til Tingenes Internett (IoT)-domenet er i ferd med å bli en del av vårt daglige liv; fra kroppsmonitorer til kritisk infrastruktur brukes de overalt. Dette gjør dem til ideelle mål for aktører som ønsker å ... -
Experiences with Linux Mobile
(Master thesis, 2007)Mobile phones are becoming more and more complex in terms of both hardware and software. Linux Mobile, as a term covering both the kernel and its surrounding components that together form the operating system, is said to ... -
Experiencing OptiqueVQS: A Multi-paradigm and Ontology-based Visual Query System for End Users
(Journal article; Peer reviewed, 2015-04-02)Data access in an enterprise setting is a determining factor for value creation processes, such as sense-making, decision-making, and intelligence analysis. Particularly, in an enterprise setting, intuitive data access ... -
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging
(Journal article; Peer reviewed, 2018)Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ... -
Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging
(Journal article; Peer reviewed, 2019)Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ... -
Experimental and Analytical Analysis of a Virtualized Network Function
(Master thesis, 2019)number of hardware appliances. Furthermore, deploying a new Network Function(NF) often requires installing yet another variety of proprietary hardware. This iscompounded by the increasing costs of energy and capital ... -
Experimental Assessment of Private Information Disclosure in LTE Mobile Networks
(Chapter, 2017)Open source software running on SDR (Software Defined Radio) devices now allow building a full-fledged mobile network at low cost. These novel tools open up for exciting possibilities to analyse and verify by experiments ... -
Experimental assessment on routing of network traffic in software using commodity hardware
(Master thesis, 2019)Prosessering av nettverkstrafikk i programvare på standardisert maskinvare er hovedtemaet for denne masteroppgaven. Overgangen fra å flytte prosesseringen fra spesialisert maskinvare til programvare har hatt en drastisk ... -
Experimental evaluation of DDoS detection and prevention using open-source and commodity hardware
(Master thesis, 2018)Distributed Denial of Service (DDoS) attack is a serious threat to companies with an active online business as its scope is increasing in size, frequency and complexity. That is why it has become a high priority task to ... -
Experimental Security Analysis of Connected Pacemakers
(Chapter, 2022)Medical devices and their connectivity capabilities are providing a variety of benefits to the healthcare domain, including remote monitoring, automated alerts, and improved patient outcomes. However, these medical devices ... -
Experimental validation of a new impedance based protection for networks with distributed generation using co-simulation test platform
(Peer reviewed; Journal article, 2019)Combined real-time hardware-in-the-loop simulations and modeling of communication networks (co-simulation platforms) is a powerful test-bed for development and validation of relay protection schemes utilizing communication ... -
Explainable Visualization for Morphing Attack Detection
(Peer reviewed; Journal article, 2022)Detecting morphed face images has become critical for maintaining trust in automated facial biometric verification systems. It is well demonstrated that better biometric performance of the Face Recognition System (FRS) ... -
Exploiting Race Conditions in Web Applications with HTTP/2
(Master thesis, 2020)Race conditions are a well-known problem in environments where there are several concurrent execution flows, such as threads or processes. Web applications often run in such a multithreaded environment, in which client ... -
Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol
(Journal article; Peer reviewed, 2019)The USB Power Delivery protocol enables USB-connected devices to negotiate power delivery and exchange data over a single connection such as a USB Type-C cable. The protocol incorporates standard commands;however, it also ...