Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1098-1117 av 2626
-
Hadoop, and Its Mechanisms for Reliable Storage
(Master thesis, 2018)Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ... -
Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules
(Master thesis, 2007)Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ... -
Handover between Wireless Networks for Medical Applications
(Master thesis, 2016)This project takes inspiration from the medical area and focuses on how the Internet of Things can provide improvements. The idea is to build a system that leaves the patients move freely in the hospital and in the meanwhile ... -
Hardware-In-the-Loop (HIL) networksimulation for supporting electrical power grid sub-stations
(Master thesis, 2021)Utviklingen av strømnettet går mot en digitalisering og konvensjonelle transformatorstasjoner (eng: sub-stations) planlegges å fases ut til fordel for digitaliserte. Ved å digitalisere transformatorstasjonene er det mulig ... -
Hardware-in-the-loop testing of impedance protection with compensation of fault impedance and DG infeed current
(Journal article; Peer reviewed, 2018)The standard impedance protection deployed in distribution networks can malfunction due to underreach errors caused by fault impedances and remote infeed currents from embedded generators (becoming more and more widespread). ... -
Hash Functions and Gröbner Bases Cryptanalysis
(Doktoravhandlinger ved NTNU, 1503-8181; 2012:111, Doctoral thesis, 2012)Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications by themselves, and they ... -
HashTag Erasure Codes: From Theory to Practice
(Journal article; Peer reviewed, 2018)Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. ... -
Healthcare Security Practice Analysis, Modelling and Incentivization
(Doctoral theses at NTNU;2023:170, Doctoral thesis, 2023)The human aspect of information security practice has become a global concern. According to Verizon’s 2022 data breaches report, over 80% of data breaches were caused by the human aspect, and this trend has been consistent ... -
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey
(Journal article; Peer reviewed, 2019)The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, ... -
HEBI: Homomorphically Encrypted Biometric Indexing
(Chapter, 2023)Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ... -
Hendelseshåndtering i små og mellomstore bedrifter
(Bachelor thesis, 2010)Hendelseshåndtering er et spennende og viktig tema innenfor informasjonssikkerhet. Det finnes en del faglitteratur om emnet, men kunnskapen om hvordan hendelseshåndtering anvendes er ikke godt kartlagt. Det var derfor ... -
Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU
(Chapter, 2018)In recent years, the Ray Tracing of Implicit Surfaces on a GPU has been studied by many researchers. However, the existing methods have challenges that mainly includes solving for self-intersecting surfaces. General solutions ... -
Heterogeneous Preferences and Patterns of Contribution in Cybersecurity as a Public Good
(Chapter, 2021)This paper presents an agent-based model of contribution to cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information ... -
High level information security risk in higher education
(Master thesis, 2020)Identifisere verdier, trusler og sårbarheter er avgjørende når du vurderer risikoer i organisasjoner. Flere av de mest kjente informasjonssikkerhetsrisiko rammeverkene som ISO/IEC 27005, NIST SP 800-39 og OCTAVE bruker ... -
Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks
(Chapter, 2019)Modern networks increasingly rely on Software-defined Networking (SDN) and Network Function Virtualization (NFV) to augment their flexibility in high load scenarios. To further enhance the performance, a part of the ... -
HIKOS - Highly Secure, Intelligent Software Copy-Protection
(Master thesis, 2011)Software piracy, which includes reproducing and distributing software products illegaly and without authorization, continues to cause financial losses to software vendors. Dongles for hardware protection have been present ... -
Hip movement based authentication: how will imitation affect the results?
(Master thesis, 2006)NORSK: Denne oppgaven vil se på en metode innen biometrisk autentisering som er ganske ny innen denne type forskning. Metoden tar for seg autentisering av en person ved å registrere hofte bevegelsen i løpet av ordinær ... -
Holding on to Compliance While Adopting DevSecOps: An SLR
(Journal article; Peer reviewed, 2022)The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ... -
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda
(Peer reviewed; Journal article, 2020)Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ... -
A Holistic Approach to Dependability Modeling and Analysis of Smart Distribution Grids
(Doctoral theses at NTNU;2021:56, Doctoral thesis, 2021)Lately, the distribution grid has been under a significant transformation, with a pervasive integration of Information and Communication Technology (ICT) for an enhanced operation and management of the grid. Some of the ...