• How safe are children on online social platforms 

      Afzal, Hussein; Afzal, Hassen; Nimalmohan, Madhushan; Abdulle, Mohamed K Hassan (Bachelor thesis, 2021)
      Denne rapporten er en vurdering og evaluering av tryggheten til barn som er på sosiale plattformer, for denne oppgaven inkluderer det Moviestarplanet, Roblox, Snapchat og TikTok. Metoden for å gjennomføre analysen er basert ...
    • How to do it right: A framework for biometrics supported border control 

      Abomhara, Mohamed Ali Saleh; Yildirim Yayilgan, Sule; Nymoen, Anne Hilde Ruen; Shalaginova, Marina; Székely, Zoltán; Elezaj, Ogerta (Journal article; Peer reviewed, 2019)
      Complying with the European Union (EU) perspective on human rights goes or should go together with handling ethical, social and legal challenges arising due to the use of biometrics technology as border control technology. ...
    • How to make money on mobile applications 

      Tveten, Thomas Moltke-H (Master thesis, 2014)
      The number of mobile applications grows exponential fast with 1,000 new applications published each day, and 1 million already available. The competition among applications is fierce, but the applications that become popular ...
    • Human Behavior Prediction for Risk Analysis 

      Szekeres, Adam; Snekkenes, Einar Arthur (Chapter, 2021)
      The Conflicting Incentives Risk Analysis (CIRA) method makes predictions about human decisions to characterize risks within the domain of information security. Since traditional behavior prediction approaches utilizing ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Human Motivation as the Basis of Information Security Risk Analysis 

      Szekeres, Adam (Doctoral theses at NTNU;2020:373, Doctoral thesis, 2020)
      The electric grid represents a critical infrastructure which has an essential rolein supporting societies. Therefore, it is important to identify, analyse and mitigate undesirable events that may disrupt the reliable ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Human-Robot Collaboration: Safety by Design 

      Degeorges, Théo; Sziebig, Gabor (Journal article, 2021)
      High payload industrial robots, unlike collaborative robots are not designed to work together with humans. Collaboration can only happen in situations, where the human and robot is separated with a distance, which allows ...
    • Hunting malicious scripts using machine learning 

      Brevig, Torstein (Master thesis, 2020)
      Siden datamaskiner er i bruk overalt i samfunnet, har ondsinnet programvare (skadevare) vokst til en stor trussel. For eksempel har bruken av ransomware økt de siste årene. En måte å spre slik skadevare på er ved bruk av ...
    • Hunting malicious scripts using machine learning 

      Lien, Tormod Haus (Master thesis, 2021)
      Datasystemer har blitt mer og mer avgjørende for samfunnet vårt, noe som betyr at disse systemene har blitt mer verdifulle enn noen gang før, og er derfor utsatt for interaksjoner fra personer med ondsinnede hensikter. Det ...
    • Hybrid analysis for Android malware family classification in a time-aware setting 

      Fauskrud, Joakim (Master thesis, 2019)
      Flere millioner ondsinnede Android applikasjoner (skadevare) detekteres hvert år. Disse applikasjonene skjuler seg i Android-markedsplasser ved utgi seg for å være godsinnede applikasjoner. Når en bruker installerer ...
    • Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption 

      Bassit, Amina; Hahn, Florian; Veldhuis, Raymond Nicolaas Johan; Peter, Andreas (Peer reviewed; Journal article, 2022)
      Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric ...
    • Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption 

      Bassit, Amina; Hahn, Florian; Veldhuis, Raymond Nicolaas Johan; Peter, Andreas (Peer reviewed; Journal article, 2022)
      Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric ...
    • Hybrid Context-aware Message Flooding for Dead Spot Mitigation in V2I Communication 

      Puka, Ergys; Herrmann, Peter; Taherkordi, Amirhosein (Peer reviewed; Journal article, 2020)
      An often overlooked practical problem in Intelligent Transportation Systems (ITS) is the presence of areas without cellular network connectivity, so-called dead spots, which aggravates the communication between vehicles ...
    • Hybrid IoT Cyber Range 

      Balto, Karl Edvard (Master thesis, 2022)
      Bruken av IoT enheter har økt kraftig de siste årene, utviklingen av nye enheter går fort, prisene presses og dermed må også kostnadene reduseres. IoT enheter får flere og flere oppgaver der det blir mer kritisk at enhetene ...
    • Hybrid IoT Cyber Range 

      Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)
      The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ...
    • Hybrid Peer-to-Peer Solution for MMORPGs 

      Aasen, Frode Voll; Johannessen, Tom-Christian Bjørlo (Master thesis, 2009)
      This thesis provides an introduction to the MMORPG genre, and the challenges of engineering a networking system supporting these games, as well as the state of the art titles that exist on the market today. Further it ...
    • Hybridising Classical and Post-Quantum Cryptography in WireGuard 

      Engen, Sander Strand (Master thesis, 2023)
      På grunn av usikkerheten rundt sikkerhetsegenskapene til post-kvante kryptosystemer bør tidlig adopsjon av post-kvante kryptografi bli utført ved å bruke hybride systemer, hvor et post-kvante kryptosystem blir implementert ...
    • Hyperbolic geometry for colour metrics 

      Farup, Ivar (Journal article; Peer reviewed, 2014)
      It is well established from both colour difference and colour order perpectives that the colour space cannot be Euclidean. In spite of this, most colour spaces still in use today are Euclidean, and the best Euclidean colour ...
    • Hyperledger Fabric Platform for Healthcare Trust Relations - Proof of Concept 

      Nedaković, Aleksandar; Hasselgren, Anton Karl Oskar; Kralevska, Katina; Gligoroski, Danilo (Peer reviewed; Journal article, 2023)
      In recent years, blockchain technologies have expanded from the finance field to other areas that rely on trust-based solutions. The healthcare industry represents one such area, as digital transformation disrupts relationships ...