Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1118-1137 av 2527
-
IDSanity: a centralized and modular framework for managing IDPS and WAF rulesets
(Bachelor thesis, 2015)In a big and complex network of IDPS and/or WAF nodes it may become time-consuming and complicated to maintain and keep control of all the different rule sets which are active at a given time. This can potentially lead to ... -
IEC 62443 Standard for Hydro Power Plants
(Peer reviewed; Journal article, 2023)This study approaches cyber security in industrial environments focusing on hydro power plants, since they are part of the critical infrastructure and are the main source of renewable energy in some countries. The theoretical ... -
Ikke-tekniske cybersikkerhetsbarrierer for OT-systemer i petroleumsindustrien
(Master thesis, 2022)Petroleumsindustrien blir stadig mer digitalisert, noe som fører til en sammenkobling av IT- og OT-systemer. Sammenkoblingen fører til at trusselbildet til OT-systemene utvides til å også omfatte cybersikkerhetstrusler. ... -
Ikke-tekniske cybersikkerhetsbarrierer for OT-systemer i petroleumsindustrien
(Master thesis, 2022)Petroleumsindustrien blir stadig mer digitalisert, noe som fører til en sammenkobling av IT- og OT-systemer. Sammenkoblingen fører til at trusselbildet til OT-systemene utvides til å også omfatte cybersikkerhetstrusler. ... -
Image quality metrics for the evaluation of print quality
(Proceedings of SPIE;7867, Journal article; Peer reviewed, 2011)Image quality metrics have become more and more popular in the image processing community. However, so far, no one has been able to define an image quality metric well correlated with the percept for overall image quality. ... -
Impact of Conversation Task When Testing QoE in WebRTC
(Master thesis, 2018)Video conferencing was previously associated with dedicated hardware and professional conferencing systems. The last years applications and services enabling Real-Time Communication with no need for additional software ... -
Impact of cyber risk on the safety of the MilliAmpere2 Autonomous Passenger Ship
(Peer reviewed; Journal article, 2020)The digitalization of the maritime sector is continuously growing, leading to increased automation, such as, the development of autonomous vessels. The Autonomous Passenger Ship (APS) is a characteristic instantiation of ... -
Impact of Deep Learning Libraries on Online Adaptive Lightweight Time Series Anomaly Detection
(Chapter, 2023)Abstract: Providing online adaptive lightweight time series anomaly detection without human intervention and domain knowledge is highly valuable. Several such anomaly detection approaches have been introduced in the past ... -
The impact of preprocessing in natural language for open source intelligence and criminal investigation
(Journal article, 2019)Underground forums serves as gathering place for like-minded cyber criminals and are an continued threat to law and order. Law enforcement agencies can use Open-Source Intelligence (OSINT) to gather valuable information ... -
Impact of SDN Controllers Deployment on Network Availability
(Research report, 2016)Software-defined networking (SDN) promises to improve the programmability and flexibility of networks, but it may bring also new challenges that need to be explored. The purpose of this technical report is to assess how ... -
The Impact of Stress on Healthcare Staffs’ Cybersecurity Practices
(Doctoral theses at NTNU;2023:285, Doctoral thesis, 2023)Digitalization has revolutionized the healthcare industry, offering numerous advantages. However, it has also introduced the risk of data breaches through cyber-attacks. Healthcare information systems, containing valuable ... -
The impact of synthetic text generation for sentiment analysis using GAN based models
(Peer reviewed; Journal article, 2022)Data imbalance in datasets is a common issue where the number of instances in one or more categories far exceeds the others, so is the case with the educational domain. Collecting feedback on a course on a large scale and ... -
The Impact of Translating Resource-Rich Datasets to Low-Resource Languages Through Multi-Lingual Text Processing
(Journal article; Peer reviewed, 2021) -
Impact of Unreliable Content on Social Media Users during COVID-19 and Stance Detection System
(Peer reviewed; Journal article, 2021)The abundant dissemination of misinformation regarding coronavirus disease 2019 (COVID-19) presents another unprecedented issue to the world, along with the health crisis. Online social network (OSN) platforms intensify ... -
Implementation of BOLA and Comparison with Other Adaptive Bitrate (ABR) Mechanisms in the OMNeT++ Simulation Platform
(Master thesis, 2023)I dag er vi være vitne til en økning i videostreaming på internett, muliggjort av en rekke strømningsteknologier som er tilgjengelige over hele verden. En av de mest utbredte teknikkene som brukes for videostreaming er ... -
Implementation of Data Loss Prevention Mechanisms in a Knowledge Organization: A Balance Between User Experience and Security
(Master thesis, 2019)De fleste organisasjoner har retningslinjer for hvordan man skal be- skytte og klassifisere data. Til tross for dette, skjer det dessverre mange hendelser hvor data går tapt eller lekkes i næringslivet. Det er også en ... -
Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
(Journal article; Peer reviewed, 2019)An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information ... -
Implementation of public key algorithms in CUDA
(Master thesis, 2010)In the field of cryptography, public key algorithms are widely known to be slower than symmetric key alternatives for the reason of their basis in modular arithmetic. The modular arithmetic in e.g. RSA and Diffie Hellman ... -
Implementation of the DEMOS simulation model into NS-3
(Master thesis, 2013)Simulators are software which allows the creation of models of real systemsand situations. They allow research and development projects to try outtheories and potential solutions on products before they are completed.?Discrete ... -
Implementing a Secure Ad Hoc Network
(Master thesis, 2011)In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication ...