Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 967-986 av 2594
-
Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
(Chapter, 2017)The purpose of this study is to investigate various factors that can affect the willingness of the IT professionals in Norway to share their knowledge in the open communities of practice. The study is conducted through an ... -
Factors influencing QoE of video consultations
(Peer reviewed; Journal article, 2021)During the Covid-19 pandemic, the use of videoconferencing for medical consultations between patients and general practitioners (GPs) has strongly increased. The aim of this work-in-progress paper is to investigate which ... -
Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
(Chapter, 2017)The purpose of this study is to contribute to a better understanding of the current status of the participation of the information security professionals (ISPs) in the electronic communities of practice (eCoP) in the ... -
Factors Influencing the Pricing Structure of Dark Fibers for Long Haul Communication
(Master thesis, 2018)The society today are becoming more and more connected. All new devices are connected to the Internet, transmitting data to the cloud making it possible for users to remotely control anything from anywhere, and virtually ... -
Failure analysis and prediction in compound system by wavelets
(Master thesis, 2016)The current overall ICT infrastructure mainly the Internet and Telecom networks can be looked upon as an ecosystem, which is the result of the cooperation between a huge number of Autonomous systems (ASes). The interconnection ... -
Failure Impact, Availability and Cost Analysis of PONs Based on a Network Geometric Model
(Journal article; Peer reviewed, 2014) -
Failure Process Characteristics of Cloud-Enabled Services
(Chapter; Peer reviewed, 2017)The design of cloud computing technologies need to guarantee high levels of availability and for this reason there is a large interest in new fault tolerant techniques that are able to keep the resilience of the systems ... -
Fair Airtime Allocation for Content Dissemination in WiFi-Direct-Based Mobile Social Networks
(Chapter, 2017)The vast penetration of smart mobile devices provides a unique opportunity to make mobile social networking pervasive by leveraging the feature of short-range wireless communication technologies (e.g. WiFi Direct). In this ... -
Fair Local Resource Management in Mobile Social Networks
(Doctoral theses at NTNU;2018:272, Doctoral thesis, 2018)As 5G made its global debut at the Winter Olympics in Pyeongchang, the world is one step closer to its mass commercial deployments. However, the practical application of 5G will be limited to dense urban areas due to ... -
Fallacies when Evaluating Digital Evidence Among Prosecutors in the Norwegian Police Service
(Master thesis, 2019)Digitale bevis har vært en naturlig del av bevisbildet i retten i flere år, men fortsatt ser det ut til at digitale bevis skaper usikkerhetsmomenter. Rettsvesenets manglende forståelse for digitale bevis kan potensielt ... -
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
(Peer reviewed; Journal article, 2021)Biometric verification has been widely deployed in current authentication solutions as it proves the physical presence of individuals. Several solutions have been developed to protect the sensitive biometric data in such ... -
Fast and Secure Updatable Encryption
(Peer reviewed; Journal article, 2020)Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update ... -
Fast and Straightforward Feature Selection Method: A Case of High-Dimensional Low Sample Size Dataset in Malware Analysis
(Chapter, 2021)Malware analysis and detection is currently one of the major topics in the information security landscape. Two main approaches to analyze and detect malware are static and dynamic analyses. In order to detect a running ... -
Fast Implementation of Two Hash Algorithms on nVidia CUDA GPU
(Master thesis, 2009)User needs increases as time passes. We started with computers like the size of a room where the perforated plaques did the same function as the current machine code object does and at present we are at a point where the ... -
Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks
(Journal article; Peer reviewed, 2017)Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and ... -
A Feature Discretization Method for Classification of High-Resolution Remote Sensing Images in Coastal Areas
(Journal article; Peer reviewed, 2021)Feature discretization is one of the most relevant techniques for data preprocessing in remote sensing research area. Its main goal is to transform the continuous features of images into discrete ones to improve the ... -
Feature Extraction and Analysis Approach for Distinguishing Between Different Types of Malicious Websites
(Master thesis, 2023)Denne oppgaven fokuserer på å skille mellom forskjellige typer ondsinnede nettsteder ved å identifisere fremtredende attributter blant forskjellige typer ondsinnede nettsider. Den raske utviklingen av ondsinnede nettsteder ... -
Feature Extraction and Static Analysis for Large-Scale Detection of Malware Types and Families
(Master thesis, 2016-02-01)There exist different methods of identifying malware, and widespread method is the one found in almost every antivirus solution on the market today; the signature based approach. This approach uses a one-way cryptographic ... -
Feature-based detection of fake Twitter profiles using machine learning
(Master thesis, 2020)Denne hovedoppgaven undersøker hvordan falske Twitter-profiler kan identifiseres ved hjelp av maskinlæring. Ved å bruke et datasett med 1000 falske kontoer og 10.000 ekte kontoer, lærer vi opp våre binære klassifiseringsmodeller ... -
Fiber to the Home with an Emphasis on Greenfield Developments
(Master thesis, 2008)Fibre-to-the-home (FTTH) is experiencing great public acceptance throughout the world, as well as in Norway. This thesis investigates the technological, economical and strategic aspects of FTTH with an emphasis on greenfield ...