Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1007-1026 av 2627
-
Fine tuning BERT for detecting cyber grooming in online chats
(Master thesis, 2023)This thesis will look into how cyber grooming may be detected through the natural language processing model BERT, with an emphasis on the use of abbreviations and slang present in the chats. To investigate this, several BERT ... -
Finger Vein Indexing using Unsupervised Clustering
(Master thesis, 2015)Finger vein recognition systems have gained more popularity recently, and it is one of the most reliable biometric modality. Finger veins are present inside the finger, and its pattern is not known which makes it hard to ... -
Fingerphoto Verification Using Siamese Neural Network
(Master thesis, 2020)De siste årene har vi hatt en enorm utvikling av portable enheter. Sensorene i smart-telefoner og bærbare datamaskiner har kommet til det stadiet at de åpner for nye former for biometrisk autentisering. En av disse formene ... -
Fingerprint Image Quality: Predicting Biometric Performance
(Doctoral Dissertations at Gjøvik University College;5-2015, Doctoral thesis, 2015-11-30)Biometric systems and fingerprint recognition systems in particular have become very widespread in the recent years, both in mobile devices and through increased usage in border controls and electronic national identification ... -
Fingerprintløsning for lokalisering ved bruk av WLAN
(Master thesis, 2010)I forbindelse med denne masteroppgaven har det blitt designet, implementert og testet en nettsentrert lokaliseringsløsning for WLAN. Løsningen baserer seg på innsamling av lokasjonsdata i form av lokasjonsfingeravtrykk. ... -
FiPrAD - A Guideline for Fingerprint Presentation Attack Database Creation
(Bachelor thesis, 2018)Abstract: Nowadays, biometric recognition systems are widely implemented in many personal devices like smartphones and laptops, as it provides higher security while identifying the real owners of these devices. Fingerprint ... -
Firewall models in cloud environments
(Master thesis, 2022)Denne oppgaven undersøker hvordan tradisjonelle sentraliserte og sonebaserte brannmurer kan migreres til moderne mikrosegmenterte og virtuelt distribuerte brannmurer. En slik migrering anses som en høy risiko siden den ... -
Fjernavlesning av vannmålere med LoRa-teknologi
(Bachelor thesis, 2019)I dag blir all vannavlesning i Ringsaker kommune gjort manuelt av huseierene. Teknisk drift i Ringsaker kommune er interessert i å automatisere denne prosessen, og LoRaWAN er en teknologi som kan bli brukt for å muliggjøre ... -
Fleet Management Optimisation
(Master thesis, 2007)This Master's Thesis is built around the concept of fleet management, focusing on designing and implementing a solution for such a purpose. As a target domain for this proposed system snow clearing has been chosen, and it ... -
Fog Computing in Healthcare – A Review and Discussion
(Journal article; Peer reviewed, 2017)Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ... -
Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims
(Journal article; Peer reviewed, 2023)Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ... -
Forecasting Electricity Load With Hybrid Scalable Model Based on Stacked Non Linear Residual Approach
(Peer reviewed; Journal article, 2021)Power has totally different attributes than other material commodities as electrical energy stockpiling is a costly phenomenon. Since it should be generated when demanded, it is necessary to forecast its demand accurately ... -
Forensic analysis of an unknown embedded device
(Master thesis, 2006)Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ... -
Forensic Analysis of OOXML Documents
(Master thesis, 2014)Microsoft Office 2007 and subsequent versions use an XML-based file format called Office Open XML (OOXML) for storing documents, spreadsheets and presentations. OOXML documents are often collected in forensic investigations, ... -
Forensic Analysis of Physical Memory and Page File
(Master thesis, 2009)With the passage of time, the field of computer forensics is maturing and the traditional methodology of disk forensics has now become a standard. In the same manner volatile data forensics is also getting serious attention ... -
Forensic Key Discovery and Identification: Finding Cryptographic Keys in Physical Memory
(Master thesis, 2008)Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present ... -
Forensic triage of digital evidence from the Internet of Things
(Doctoral theses at NTNU;2024:342, Doctoral thesis, 2024)The Internet of Things (IoT) has long been a popular topic that has led to numerous commercial innovations and products in a wide range of fields. As the number of deployed IoT systems worldwide rises, these systems should ... -
Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode
(Journal article; Peer reviewed, 2018)The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security ... -
Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives
(Chapter, 2024)This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ...