• Hunting malicious scripts using machine learning 

      Brevig, Torstein (Master thesis, 2020)
      Siden datamaskiner er i bruk overalt i samfunnet, har ondsinnet programvare (skadevare) vokst til en stor trussel. For eksempel har bruken av ransomware økt de siste årene. En måte å spre slik skadevare på er ved bruk av ...
    • Hunting malicious scripts using machine learning 

      Lien, Tormod Haus (Master thesis, 2021)
      Datasystemer har blitt mer og mer avgjørende for samfunnet vårt, noe som betyr at disse systemene har blitt mer verdifulle enn noen gang før, og er derfor utsatt for interaksjoner fra personer med ondsinnede hensikter. Det ...
    • Hybrid analysis for Android malware family classification in a time-aware setting 

      Fauskrud, Joakim (Master thesis, 2019)
      Flere millioner ondsinnede Android applikasjoner (skadevare) detekteres hvert år. Disse applikasjonene skjuler seg i Android-markedsplasser ved utgi seg for å være godsinnede applikasjoner. Når en bruker installerer ...
    • Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption 

      Bassit, Amina; Hahn, Florian; Veldhuis, Raymond Nicolaas Johan; Peter, Andreas (Peer reviewed; Journal article, 2022)
      Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric ...
    • Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption 

      Bassit, Amina; Hahn, Florian; Veldhuis, Raymond Nicolaas Johan; Peter, Andreas (Peer reviewed; Journal article, 2022)
      Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric ...
    • Hybrid Context-aware Message Flooding for Dead Spot Mitigation in V2I Communication 

      Puka, Ergys; Herrmann, Peter; Taherkordi, Amirhosein (Peer reviewed; Journal article, 2020)
      An often overlooked practical problem in Intelligent Transportation Systems (ITS) is the presence of areas without cellular network connectivity, so-called dead spots, which aggravates the communication between vehicles ...
    • Hybrid IoT Cyber Range 

      Balto, Karl Edvard (Master thesis, 2022)
      Bruken av IoT enheter har økt kraftig de siste årene, utviklingen av nye enheter går fort, prisene presses og dermed må også kostnadene reduseres. IoT enheter får flere og flere oppgaver der det blir mer kritisk at enhetene ...
    • Hybrid IoT Cyber Range 

      Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)
      The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ...
    • Hybrid Peer-to-Peer Solution for MMORPGs 

      Aasen, Frode Voll; Johannessen, Tom-Christian Bjørlo (Master thesis, 2009)
      This thesis provides an introduction to the MMORPG genre, and the challenges of engineering a networking system supporting these games, as well as the state of the art titles that exist on the market today. Further it ...
    • Hybridising Classical and Post-Quantum Cryptography in WireGuard 

      Engen, Sander Strand (Master thesis, 2023)
      På grunn av usikkerheten rundt sikkerhetsegenskapene til post-kvante kryptosystemer bør tidlig adopsjon av post-kvante kryptografi bli utført ved å bruke hybride systemer, hvor et post-kvante kryptosystem blir implementert ...
    • Hyperbolic geometry for colour metrics 

      Farup, Ivar (Journal article; Peer reviewed, 2014)
      It is well established from both colour difference and colour order perpectives that the colour space cannot be Euclidean. In spite of this, most colour spaces still in use today are Euclidean, and the best Euclidean colour ...
    • Hyperledger Fabric Platform for Healthcare Trust Relations - Proof of Concept 

      Nedaković, Aleksandar; Hasselgren, Anton Karl Oskar; Kralevska, Katina; Gligoroski, Danilo (Peer reviewed; Journal article, 2023)
      In recent years, blockchain technologies have expanded from the finance field to other areas that rely on trust-based solutions. The healthcare industry represents one such area, as digital transformation disrupts relationships ...
    • Høringssvar ang. forslag til endringer i valgforskriften 

      Mjølsnes, Stig Frode; Amundsen, Vilde Elise (Research report, 2018)
      Dette høringssvaret har sitt utgangspunkt i et masteroppgavearbeid av Vilde Amundsen under utførelse dette høstsemesteret ved Institutt for informasjonssikkerhet og kommunikasjonsteknologi ved NTNU, i samarbeid med ekstern ...
    • I still know who you are! Soft Biometric Keystroke Dynamics performance with distorted timing data 

      Moe, Tobias (Master thesis, 2021)
      Bruken av keystroke dynamics some en autentiserings metode er et godt undersøkt felt. I keystroke dynamics så bruker vi skrive måten, i tillegg til brukernavn og password, når vi autentiserer. En av problem stillingene som ...
    • ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing 

      Toftegaard, Øyvind Anders Arntzen (Master thesis, 2017)
      ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ...
    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Identification, Location Tracking and Eavesdropping on Individuals by Wireless Local Area Communications 

      Andersen, Markus (Master thesis, 2019)
      Nesten alt brukerutstyr med trådløs funksjonalitet har maskinvare som har en MAC-adresse innebygd. En MAC-adresse er en unik ID, i lag to av OSI-modellen [1], for å separere brukerutstyr i lokale nettverk (LAN). En MAC-adresse ...
    • Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems 

      Akbarzadeh, Aida; Katsikas, Sokratis K. (Peer reviewed; Journal article, 2021)
      Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ...
    • Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces 

      Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2018)
      Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ...
    • Identifying keys using acoustic emanations from keystrokes 

      Nakken, Nicolai (Master thesis, 2023)
      Tidligere forskining har vist det er mulig å rekonstruere tekst skrevet på tastatur ved å analysere lyden som blir laget. Dette indikerer en stor sikkerhetstrussel, og et behov for videre forsking. I denne masteoppgaven ...