Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1257-1276 av 2594
-
International Business Potential for Analytics of Room Utilization
(Master thesis, 2015)Many universities worldwide have large campuses which they are trying to maintain and administer in the best way possible. Their infrastructure often includes numerous auditoriums with access to the Internet by the Wi-Fi ... -
International Potential for a Free Model in a B2B&C Market
(Master thesis, 2016)Several establishments worldwide are growing in size and see frequent internal changes in buildings, which presents a demand to manage and accommodate these changes in order to maintain a satisfied customer base. One ... -
Internet Control for Residential Users
(Master thesis, 2013)Internet based services have become an important part of our lives, and broadband access has reached the commodity phase in most developed countries. A growing portion of the time spent on-line among younger Internet users ... -
Internet filtering and how it affects security, efficiency and thriving in Norwegian companies
(Master thesis, 2005)NORSK: I dette prosjektet har vi undersøkt hvordan internettfiltrering kan bidra til øket sikkerhet i nettverk, og hvordan internettsensur påvirker organisasjonen sosialt. Vi har valgt en blanding av kvalitativ og kvantitativ ... -
Internet of Things - Cybersecurity at Home
(Master thesis, 2017)IoT enheter har flere ganger blitt bevist å mangle skikkelige sikkerhetsmekanismer. Forbrukere er ofte ikke klar over hvordan farene slike enheter påvirker deres privatliv og sikkerhet. Denne oppgaven utfordrer problemet ... -
Interoperability at the Application Layer in the Internet of Things
(Master thesis, 2015)The Internet of Things consists of heterogeneous devices from a range of uncoordinated vendors, and this causes an interoperability problem. This thesis studies potential solutions to these challenges on the application ... -
Interoperable Protected Fingerprint Minutiae Templates
(Master thesis, 2012)With the increasing use of biometric enabled systems, a large amount of biometric systems, sensors, feature formats and matching algorithms have been developed and various template protection methods have been proposed ... -
Interpretation of File System Metadata in a Criminal Investigation Context
(Doctoral theses at NTNU;2024:115, Doctoral thesis, 2024)The reliable reconstruction of digital events is imperative for solving criminal cases. Computers, servers, mobile and IoT devices, vehicles, and EV charging infrastructure all use either local or remote storage (cloud). ... -
Introducing Mobile Network Security Experiments to Communication Technology Education
(Journal article; Peer reviewed, 2017)We describe a new viable lab assignment that enhances the theoretical study of wireless network security in our master-level communication technology education with hands-on mobile access network experimentation for the ... -
Introducing the BDX Platform - bringing IoT to the Fitness Sector
(Master thesis, 2016)This purpose of this thesis is to describe a system allowing users to record their workout data without acquiring custom gear, such as an activity wrist band. Given this description, the necessary assessments required to ... -
Introduction to the Special Issue on TLS 1.3
(Journal article; Peer reviewed, 2021) -
Intrusion Detection in High-Speed Networks
(Master thesis, 2007)This thesis investigates methods for implementing an intrusion detection system (IDS) in a high-speed backbone network. The work presented in this report is run in cooperation with Kripos and Uninett. The popular IDS ... -
Intrusion Detection System In IoT
(Master thesis, 2017)Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage ... -
Intrusion tolerance in Publish/Subscribe based MANET
(Master thesis, 2009)Public/Subscribe (PubSub) paradigm is a powerful abstraction for building distributed applications and message distribution networks, and seems to be well suited model for the type of communication which takes place at ... -
An inverse display color characterization model based on an optimized geometrical structure
(Proceedings of SPIE;6807, Journal article; Peer reviewed, 2008)We have defined an inverse model for colorimetric characterization of additive displays. It is based on an optimized three-dimensional tetrahedral structure. In order to minimize the number of measurements, the structure ... -
Investigating Business Alignment Issues Rooted in the Norwegian Specialist Health Services' Cybersecurity Culture, Through a Systems Thinking Approach
(Master thesis, 2020)Det norske helsevesenet er satt sammen av flere interagerende interessenter på forskjellige organisatoriske nivåer (nasjonalt, nasjonale profesjonelle, regionale og operasjonelle). Dette komplekse systemet blir kontinuerlig ... -
Investigating machine learning attacks on financial time series models
(Peer reviewed; Journal article, 2022)Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust ... -
Investigating Motivational Factors Influencing Users’ Consumption of Video Streaming Services: A Human Factor Perspective
(Chapter, 2023)This paper presents comprehensive findings obtained from an online survey focused on understanding the motivational factors influencing users’ consumption of video streaming services from a human factors perspective. The ... -
Investigating QoE in a Cloud-Based Classroom Response System: A Real-Life Longitudinal and Cross-Sectional Study of Kahoot!
(Master thesis, 2014)The goal of this thesis work is to investigate the user-perceived QoE of Kahoot!, a cloud gaming learning platform, designed to be used in classrooms. The general objective of this thesis is to investigate to what extent ... -
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
(Peer reviewed; Journal article, 2022)HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the ...