• A Greener Experience: Trade-Offs between QoE and CO<inf>2</inf> Emissions in Today's and 6G Networks 

      Hossfeld, Tobias; Varela, Martin; Skorin-Kapov, Lea; Heegaard, Poul Einar (Peer reviewed; Journal article, 2023)
      While users of Internet multimedia services demand high Quality of Experience (QoE), meeting these demands results in energy consumption along the service delivery path, from the end user's device, through the network to ...
    • Group Identification at Border Crossing Points 

      Yayilgan, Sule Yildirim; Hovstø, Asbjørn; Alaya Cheikh, Faouzi; Amodei, Anthony; Iori, Marc; Zaharia, Sandel; Ioannidis, Dimos; Thorvaldsen, Øystein Espelid (Chapter; Peer reviewed, 2011)
      Increasing Passenger flow at Border Crossing Points is an important issue at today’s border crossing points (BCPs) of land, sea and airport. Group Access Control and utilizing biometrics information will help increase ...
    • GSM and GPRS Security Using OsmocomBB 

      Pönsgen, Francois Louis (Master thesis, 2015)
      This thesis analyzes the security of Norwegian GSM and GPRS networks using the OsmocomBB project, which aims to create a free and open source GSM baseband software implementation. OsmocomBB was used to understand the GSM ...
    • Guest Editors Introduction: Special Issue on Advanced Management of Softwarized Networks 

      Kellerer, Wolfgang; Schembra, Giovanni; Hwang, Jinho; Kamiyama, Noriaki; Kang, Joon-Myung; Martini, Barbara; Pasquini, Rafael; Pezaros, Dimitrios; Zhang, Hongke; Zhani, Mohamed Faten; Zinner, Thomas (Journal article; Peer reviewed, 2021)
      The Softwarization of networks is enabled by the SDN (Software-Defined Networking), NV (Network Virtualization), and NFV (Network Function Virtualization) paradigms, and offers many advantages for network operators, service ...
    • Guest Editors' Introduction: Special Section on Smart Management of Future Softwarized Networks 

      Schembra, Giovanni; Kellerer, Wolfgang; Jacquenet, Christian; Kamiyama, Noriaki; Martini, Barbara; Pasquini, Rafael; Pezaros, Dimitrios; Riggio, Roberto; Zhang, Hongke; Zhani, Mohamed Faten; Zinner, Thomas (Peer reviewed; Journal article, 2022)
      Network softwarization is one of the key enablers of the future Internet evolution, also supporting the road from the fifth generation (5G) to the next-generation communication systems, namely 6G, with their main objective ...
    • Hadoop, and Its Mechanisms for Reliable Storage 

      Midthaug, Ingvild Hovdelien (Master thesis, 2018)
      Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ...
    • Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules 

      Kaspersen, Arne Yngve (Master thesis, 2007)
      Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ...
    • Handover between Wireless Networks for Medical Applications 

      Agostini, Michele (Master thesis, 2016)
      This project takes inspiration from the medical area and focuses on how the Internet of Things can provide improvements. The idea is to build a system that leaves the patients move freely in the hospital and in the meanwhile ...
    • Hardware-In-the-Loop (HIL) networksimulation for supporting electrical power grid sub-stations 

      Molander, Johnny (Master thesis, 2021)
      Utviklingen av strømnettet går mot en digitalisering og konvensjonelle transformatorstasjoner (eng: sub-stations) planlegges å fases ut til fordel for digitaliserte. Ved å digitalisere transformatorstasjonene er det mulig ...
    • Hardware-in-the-loop testing of impedance protection with compensation of fault impedance and DG infeed current 

      Pandakov, Konstantin; Adrah, Charles Mawutor; Liu, Zhou; Hoidalen, Hans Kristian; Kure, Øivind (Journal article; Peer reviewed, 2018)
      The standard impedance protection deployed in distribution networks can malfunction due to underreach errors caused by fault impedances and remote infeed currents from embedded generators (becoming more and more widespread). ...
    • Hash Functions and Gröbner Bases Cryptanalysis 

      Ødegård, Rune Steinsmo (Doktoravhandlinger ved NTNU, 1503-8181; 2012:111, Doctoral thesis, 2012)
      Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications by themselves, and they ...
    • HashTag Erasure Codes: From Theory to Practice 

      Kralevska, Katina; Gligoroski, Danilo; Jensen, Rune Erlend; Øverby, Harald (Journal article; Peer reviewed, 2018)
      Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. ...
    • Healthcare Security Practice Analysis, Modelling and Incentivization 

      Yeng, Prosper Kandabongee (Doctoral theses at NTNU;2023:170, Doctoral thesis, 2023)
      The human aspect of information security practice has become a global concern. According to Verizon’s 2022 data breaches report, over 80% of data breaches were caused by the human aspect, and this trend has been consistent ...
    • Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey 

      Yeng, Prosper; Yang, Bian; Snekkenes, Einar Arthur (Journal article; Peer reviewed, 2019)
      The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, ...
    • HEBI: Homomorphically Encrypted Biometric Indexing 

      Bauspieß, Pia; Grimmer, Marcel; Fougner, Cecilie; Le Vasseur, Damien; Stöcklin, Thomas Thaulow; Rathgeb, Christian; Kolberg, Jascha; Costache, Anamaria; Busch, Christoph (Chapter, 2023)
      Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ...
    • Hendelseshåndtering i små og mellomstore bedrifter 

      Sand, Lars Arne; Wangen, Gaute Bjørklund; Frogner, Anders Sand (Bachelor thesis, 2010)
      Hendelseshåndtering er et spennende og viktig tema innenfor informasjonssikkerhet. Det finnes en del faglitteratur om emnet, men kunnskapen om hvordan hendelseshåndtering anvendes er ikke godt kartlagt. Det var derfor ...
    • Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU 

      Singh, Jag Mohan; Wasnik, Pankaj Shivdayal; Ramachandra, Raghavendra (Chapter, 2018)
      In recent years, the Ray Tracing of Implicit Surfaces on a GPU has been studied by many researchers. However, the existing methods have challenges that mainly includes solving for self-intersecting surfaces. General solutions ...
    • Heterogeneous Preferences and Patterns of Contribution in Cybersecurity as a Public Good 

      Kianpour, Mazaher (Chapter, 2021)
      This paper presents an agent-based model of contribution to cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information ...
    • High level information security risk in higher education 

      Ulven, Joachim (Master thesis, 2020)
      Identifisere verdier, trusler og sårbarheter er avgjørende når du vurderer risikoer i organisasjoner. Flere av de mest kjente informasjonssikkerhetsrisiko rammeverkene som ISO/IEC 27005, NIST SP 800-39 og OCTAVE bruker ...
    • Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks 

      Gray, Nicolas; Grigorjew, Alexej; Hossfeld, Tobias; Apoorv, Shukla; Zinner, Thomas Erich (Chapter, 2019)
      Modern networks increasingly rely on Software-defined Networking (SDN) and Network Function Virtualization (NFV) to augment their flexibility in high load scenarios. To further enhance the performance, a part of the ...