Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på emneord "ntnudaim"
Viser treff 101-120 av 224
-
Information Security Measuring: Evaluation of concepts for measuring information security in an organisation, and an outline of a practical approach for this implementation
(Master thesis, 2008)Information security is essential in many situations in organisations to manage information. The threat of revealing crucial information is relevant in many businesses. Several suggestions to how an organisation could ... -
Innføring av EUs datalagringsdirektiv: Forslag til teknisk og administrativ løsning for innsamling og bruk av elektroniske kommunikasjonsdata
(Master thesis, 2010)Europa-parlamentets og Rådet for Den Europeiske Unions direktiv av 15.mars 2006 ("Datalagringsdirektivet"), er utgangspunktet for dette arbeidets forslag til en teknisk og administrativ modell for innsamling og bruk av ... -
Integration or 'Patchwork' for Communication and Messages in a Hospital
(Master thesis, 2007)Most research studies concerning implementation and use of ICT in hospitals relate to information systems. Various technologies and information systems are implemented in modern hospitals, such as EPRs, administrative ... -
Intelligent layer 2 switching by CE-ants
(Master thesis, 2007)Living in Information Society, we always want to improve the networks to get more reliability, more bit rate, less ping . CE ant Layer 2 systems appear in order to change the concept of usual centralized networks, where ... -
Intrusion Detection in High-Speed Networks
(Master thesis, 2007)This thesis investigates methods for implementing an intrusion detection system (IDS) in a high-speed backbone network. The work presented in this report is run in cooperation with Kripos and Uninett. The popular IDS ... -
Investigating the use of smartphones in the context of home networks
(Master thesis, 2010)The focus in this thesis is to investigate how smartphones on the market today can be used in the context of home networks. The latest generation of these devices has powerful hardware and software which makes them useful ... -
IPv6 Security
(Master thesis, 2007)This paper gives a brief introduction to IPv6, and continues with a discussion of the security considerations related to the implementation of the protocol. The issues described are relevant both to ISPs and campus network ... -
Java Implementation and Performance Analysis of 14 SHA-3 Hash Functions on a Constrained Device
(Master thesis, 2010)Several of the widely used cryptographic hash functions in use today are under attack. With the need to maintain a certain level of security, NIST is in the process of selecting new cryptographic hash function(s). Through ... -
KnowledgeWar: Implementation and Evaluation of a Face-to-Face Mobile Knowledge War Game
(Master thesis, 2010)Powerful smart phones are bringing computing power, high resolution screens and internet connectivity to the pockets of rapidly increasing population. This enables the users to perform more and more of their daily internet ... -
Launching an Innovative Mobile Multimedia Communication Application: using different platforms
(Master thesis, 2007)The IP Multimedia Subsystem (IMS) is intended by the Telco industry, to make it easy for third-party application developers to create new, innovative services that will help to offset the fall in revenue of regular voice ... -
Leger og sykepleieres prioritering i kommunikasjonssammenheng på sengepost
(Master thesis, 2008)I et samfunn der det stadig legges mer press på effektivisering i arbeidsforhold er offentlig sektor og sykehus på ingen måte noe unntak. Den siste tiden har man kunnet lese om store nedskjæringer i budsjettet til ... -
Long Distance Transport Protocols with High Throughput and Correction Control: eVLBI Transfers over Shared Networks
(Master thesis, 2007)Very Long Baseline Interferometry (VLBI) is a technique for gathering data using telescopes located across the globe. These data are sent to a central correlator for correlation, which produces results giving very accurate ... -
Malware Analysis; Frameworks and Tools for Automated Dynamic Analysis of Malware
(Master thesis, 2009)This thesis describes different automated dynamic malware analysis solutions and their underlying technologies. A good deal of prerequisite concepts has to be covered before the actual solutions are studied. Some of these ... -
Malware Analysis;: A Systematic Approach
(Master thesis, 2008)An almost incomprehensible amount of data and information is stored on millions and millions of computers worldwide. The computers, interconnected in local, national and international networks, use and share a high number ... -
Malware Detection Through Call Graphs
(Master thesis, 2010)Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ... -
Measurement Analysis and Improvement of rerouting in UNINETT
(Master thesis, 2007)This thesis focuses on the analysis of the rerouting times in UNINETT, the Norwegian research network. Rerouting happens in case of a topology change of the network, and the routers have to calculate new paths to all ... -
Measuring the effectiveness of information security controls
(Master thesis, 2008)With an increasing need for information security in IT the need for measuring is present to display the improvement and development of your information security over time. No best practice has been accepted in the area. ... -
Mediauavhengig handover
(Master thesis, 2006)Mediauavhengig handover skal gjera det mogleg for brukaren å nytte det beste tilkoplingspunktet uavhengig av aksessteknologi. Det kan vere å flytte ein telefonsamtale frå GSM til sitt eige heimenettverk og heilt generelt ... -
Mobile Home Access: with Tunneling Support
(Master thesis, 2006)Mobile phones and electronic gadgets on the market today have become more and more powerful, in both processing power and functionalities. Accessing files and documents residing at users home networks via a vast amount ...