Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 991-1010 av 2569
-
Fog Computing in Healthcare – A Review and Discussion
(Journal article; Peer reviewed, 2017)Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ... -
Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims
(Journal article; Peer reviewed, 2023)Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ... -
Forecasting Electricity Load With Hybrid Scalable Model Based on Stacked Non Linear Residual Approach
(Peer reviewed; Journal article, 2021)Power has totally different attributes than other material commodities as electrical energy stockpiling is a costly phenomenon. Since it should be generated when demanded, it is necessary to forecast its demand accurately ... -
Forensic analysis of an unknown embedded device
(Master thesis, 2006)Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ... -
Forensic Analysis of OOXML Documents
(Master thesis, 2014)Microsoft Office 2007 and subsequent versions use an XML-based file format called Office Open XML (OOXML) for storing documents, spreadsheets and presentations. OOXML documents are often collected in forensic investigations, ... -
Forensic Analysis of Physical Memory and Page File
(Master thesis, 2009)With the passage of time, the field of computer forensics is maturing and the traditional methodology of disk forensics has now become a standard. In the same manner volatile data forensics is also getting serious attention ... -
Forensic Key Discovery and Identification: Finding Cryptographic Keys in Physical Memory
(Master thesis, 2008)Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present ... -
Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode
(Journal article; Peer reviewed, 2018)The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security ... -
Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives
(Chapter, 2024)This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ... -
Forretningsmodeller for trådløsutbygging langs vei
(Master thesis, 2007)Utviklingen av trådløse teknologier gir opphav til stadig flere bruksområder. I denne oppgaven har jeg sett på tre av dem, nemlig kommunikasjon med kjøretøy i fart, SRO for veibelysning og vei-instrumentering. For hvert ... -
Forretningspotensialet til Wi-Fi basert løsning for automatisk måleravlesning
(Master thesis, 2011)Fokuset for denne oppgaven har vært å innhente informasjon om avansertemåle- og styringssystem (AMS) for å kunne vurdere potensialet for en Wi-Filøsning for AMS. Dette fordi det allerede i dag finnes store og profesjoneltdrevet ... -
Forwarding algorithms in vehicular networks
(Master thesis, 2014)AbstractVehicular ad hoc networks are a kind of mobile ad hoc network in which themobile nodes are fast moving vehicles. The fast movement of vehicles causesconsiderable disconnections in network links and leads to changes ... -
A Framework for Flexible Program Evolution and Verification of Distributed Systems
(Peer reviewed; Journal article, 2020)Program evolution may reveal bad design decisions, misunderstandings, erroneous code, or erroneous specifications, because problems made early in the design of a system may not be discovered until much later in the life-time ... -
Framework for generating IDS benchmarking Data sets
(Master thesis, 2007)Benchmarking Intrusion Detection Systems, IDS, is needed for comparing different systems against each other and to determine how good a single system is. For this purpose there is a need to generate test data set, which ... -
Framework for secure data collection and through integration with various APIs
(Bachelor thesis, 2023)Tussa er ett norskt selskap lokalisert på vestlandet som arbeider for å skape fremtidsrettet og miljøvennlige løsninger. Tussa ønsket en forbedret løsning på datainnsamlingen fra sine kunder gjennom Microsoft Intune, Cisco ... -
A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery
(Chapter, 2020)The support of vital societal functions requires a reliable communication network, especially in the presence of crises and disastrous events. Disasters caused by natural factors including earthquakes, fires, floods or ... -
A framework for using humanoid robots in the school learning environment
(Peer reviewed; Journal article, 2021)With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ... -
Freely-Drifting Small-Satellite Swarms for Sensor Networks in the Arctic
(Chapter, 2018)Satellite communications have been widely used to provide connectivity around the world. However, regions such as the Arctic still have limited coverage, despite the need to monitor this region. Currently, several sensors ... -
Fremtidsrettet bredbåndsscenario
(Master thesis, 2007)Utbygging av infrastruktur for bredbånd er et felt regjeringen i Norge satser på ettersom bredbånd nærmest er en forutsetning i et moderne samfunn. Samtlige husstander skal i følge Soria Moria-erklæringen ha tilbud om ... -
From Advertising to Intelligence: Investigating Tracking through Mobile Devices
(Bachelor thesis, 2024)Mobiltelefoner har blitt en forlengelse av oss selv i vårt daglige liv, og tilbyr en rekke funksjoner som gjør livene våre enklere og mer underholdende. Det finnes imidlertid en bakside; telefonene samler kontinuerlig inn ...