• Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study 

      Nweke, Livinus Obiora; Bokolo, Anthony Junior; Mba, Gibson; Nwigwe, Emeka (Peer reviewed; Journal article, 2022)
      HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the ...
    • Investigating the use of smartphones in the context of home networks 

      Gundersen, Henrik; Mafole, Prosper (Master thesis, 2010)
      The focus in this thesis is to investigate how smartphones on the market today can be used in the context of home networks. The latest generation of these devices has powerful hardware and software which makes them useful ...
    • Investigating trust relationships between software development teams and information security stakeholders 

      Buene, Knut Formo; Fridtun, Helga Tenold (Master thesis, 2022)
      Smidig utvikling har de siste tiårene fått stor oppmerksomhet i IT-industrien og forskningsmiljøet. Utviklingsmetodikken har introdusert mange fordeler for programvareleveranse, blant annet et større fokus på tverrfaglig ...
    • Investigating trust relationships between software development teams and information security stakeholders 

      Buene, Knut Formo; Fridtun, Helga Tenold (Master thesis, 2022)
      Smidig utvikling har de siste tiårene fått stor oppmerksomhet i IT-industrien og forskningsmiljøet. Utviklingsmetodikken har introdusert mange fordeler for programvareleveranse, blant annet et større fokus på tverrfaglig ...
    • Investigation into Phishing Risk Behaviour among Healthcare Staff 

      Yeng, Prosper; Fauzi, Muhammad Ali; Yang, Bian; Nimbe, Peter (Peer reviewed; Journal article, 2022)
      A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social ...
    • Investigation of LTE Privacy Attacks by Exploiting the Paging Mechanism 

      Zhou, Shelley Xianyu (Master thesis, 2018)
      In mobile communication in general, and LTE in particular, security should be a main focus, also because of the vulnerabilities introduced by the radio link. Compared to GSM and UMTS, the LTE security has been improved. ...
    • Investigation of the Gap Between Traditional IP Network Security Management and the Adoption of Automation Techniques and Technologies to Network Security 

      Treider, Gloria (Master thesis, 2023)
      Innenfor området nettverks- og nettverkssikkerhetsautomatisering avdekker denne oppgaven et komplekst landskap av utfordringer og muligheter. Forskningen som er gjennomført, belyser de intrikate elementene som er innebygd ...
    • Investigation, Analysis and Implementation of Open Source Mobile Communication Software 

      Paudel, Suresh (Master thesis, 2016)
      Over the past few years, open source software has transformed the mobile communication networks. The development of VoIP technologies has enabled the migration of telco protocols and services to the IP network with help ...
    • IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications 

      Shalaginov, Andrii; Iqbal, Asif; Olegård, Johannes (Chapter, 2020)
      Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the ...
    • IoT Sensor Gym: Training Autonomous IoT Devices with Deep Reinforcement Learning 

      Murad, Abdulmajid Abdullah Yahya; Kraemer, Frank Alexander; Bach, Kerstin; Taylor, Gavin (Chapter, 2019)
      We describe IoT Sensor Gym, a framework to train the behavior of constrained IoT devices using deep reinforcement learning. We focus on the main architectural choices to align problems from the IoT domain with cutting-edge ...
    • IoT Vulnerability Scanning: A State of the Art 

      Amro, Ahmed Walid (Chapter, 2020)
      Our modern life becomes more and more dependent on tech-nology and services provided through an increasing number of deployed devices «Things» which are connected over networks that can sometimes be accessed remotely via ...
    • IoTective: Automated Penetration Testing for Smart Home Environments 

      Nordnes, Kevin (Master thesis, 2023)
      Den raske utbredelsen av Internet of Things (IoT) har reist betydelige bekymringer angående sikkerheten og personvernet til sammenkoblede smarte miljøer. Denne masteroppgaven presenterer IoTective, et automatisert verktøy ...
    • iPhone Acquisition Using Jailbreaking Techniques 

      Varenkamp, Peter (Master thesis, 2019)
      Abstract Varenkamp Digital devices are a part of most peoples lives today. Using digital devices leaves traces. These traces can be urgent to solve a criminal case. Knowing this, forensic work has the goal to get as much ...
    • IPv6 only national backbone 

      Rey Gallo-Alcántara, Ignacio (Master thesis, 2020)
      Antallet tilgjengelige IPv4 adresser reduseres mer og mer, mens antall enheter som krever en internett-tilkobling har økt de siste årene, og det er forventet å øke videre grunnet Internet of Things (IoT). Bruken av IPv6 ...
    • IPv6 Security 

      Toreid, Vetle Vidarsson Brurberg (Master thesis, 2007)
      This paper gives a brief introduction to IPv6, and continues with a discussion of the security considerations related to the implementation of the protocol. The issues described are relevant both to ISPs and campus network ...
    • Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses 

      Osorio-Roig, Daile; Drozdowski, Pawel; Rathgeb, Christian; Morales-González, Annette; Garea-Llano, Eduardo; Busch, Christoph (Chapter, 2018)
      The prevalence of visual impairment around the world is rapidly increasing, causing large numbers of people to wear glasses. Glasses are generally considered an important noise source in iris recognition; under objective ...
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Is BS 7799 worth the effort? 

      Stamland, Frank Arne (Master thesis, 2004)
      NORSK: Denne masteroppgaven fokuserer på hvorvidt organisasjoner som har sertifisert sitt styringssystem for informasjonssikkerhet etter BS 7799, oppnår en bedre evne til å forebygge, detektere og reagere på sikkerhetsbrudd ...
    • Is the quality assurance in Digital Forensic work in the Norwegian police adequate? 

      Jahren, Jørn Helge (Master thesis, 2020)
      Denne masteroppgaven er en kvalitativ studie som baserer seg på semi-strukturerte intervjuer med dataetterforskere og kriminalteknikere fra forskjellige politidistrikter i politiet i Norge. Alle de intervjuede var erfarne ...