Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1490-1509 av 2594
-
Modeling the Competition Between Legal and Illegal Video Streaming Services
(Master thesis, 2015)Video streaming services are considered as the new standard method of delivering entertainment to the public, giving rise to a noteworthy competition between legal and illegal streaming services. Netflix, one of the leading ... -
Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model
(Chapter, 2020)In recent years, software defined networking (SDN) has been proposed for enhancing the security of industrial control networks. However, its ability to guarantee the quality of service (QoS) requirements of such networks ... -
Modelling and Analysis of Interdependencies between Financial, Communication and Power System Infrastructures in a Smart Grid Scenario
(Master thesis, 2020)Samfunnet blir stadig mer sammenkoblet, og det samme blir infrastruk- turene som underbygger det. En av de viktigste truslene mot infrastruk- tursikkerhet er gjensidige avhengigheter som utvikles mellom dem. Den økende ... -
Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges
(Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ... -
Modelling and Analyzing Cost-Effective Dependability in Passive Optical Networks
(Doctoral theses at NTNU;2017:34, Doctoral thesis, 2017)Lately, the proliferation of new applications and services as well as the penetration of the Internet has created a growing need for the deployment of broadband access networks. Mostly due to the high bandwidth they offer, ... -
Modelling and Simulation of Ego-Noise of Unmanned Aerial Vehicles
(Peer reviewed; Journal article, 2020)In this paper, we develop a simulation model for the ego-noise of unmanned aerial vehicles (UAVs). The ego-noise is composed of spike noise and background noise. The spike noise is modelled by a finite sum of sinusoids, ... -
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge
(Peer reviewed; Journal article, 2023)Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success ... -
Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship
(Chapter, 2020)There is intense activity of the maritime industry towards making remotely controlled and autonomous ships sail in the near future; this activity constitutes the instantiation of the Industry 4.0 process in the maritime ... -
Modelling Tele-economics systems using Business Dynamics
(Master thesis, 2012)There has been a major development in the industry of mobile phone devices during the last few years. From being only a device which could make phone calls and send text messages, the smartphones of today have become just ... -
Modelling the dependability in Network Function Virtualisation
(Master thesis, 2017)Network Function Virtualization has been brought up to allow the TSPs to have more possibilities and flexibilities to provision services with better load optimizing, energy utilizing and dynamic scaling. Network functions ... -
Modelling the Energy Consumption of NB-IoT Transmissions
(Master thesis, 2019)Narrow-Band Internet of Things (NB-IoT) er en voksende Low Power Wide Area Network (LPWAN) kommunikasjonsprotokoll designet for IoT applikasjoner, som har blitt implementert i mange land - inkludert Norge. Avhandlingen gir ... -
Modelling the Optimal Link Length in Wireless Sensor Networks for Two Different Media Access Protocols
(Journal article; Peer reviewed, 2015)Conservation of energy is one of the main challenges in designing a wireless sensor network (WSN). The reason is that these large scaled networks cannot be arranged, configured, or maintained manually. Thus, automated ... -
Moderating Respectful Conversations Using Reinforcement Q-Learning and Markov Decision Process Approaches
(Master thesis, 2023)I en tid hvor digital kommunikasjon er dominerende, står vi overfor et økende problem med hatprat. Denne oppgaven tar for seg anvendelsen av forsterkende læringsteknikker, spesielt Markov-beslutningsprosesser (MDP) og ... -
A Modern View on Forward Security
(Peer reviewed; Journal article, 2020)Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world ... -
Modifications to and performance evaluation of output scheduling in 3LIHON nodes
(Master thesis, 2013)Optical networks became very important in the latest years, thanks totheir high trac capacity, because of the continuous growth of totalexchanged data and the request of real-time communication.Since they have (relatively) ... -
A Modular Cyber Security Training Programme for the Maritime Domain
(Journal article; Peer reviewed, 2024)The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other industrial domains. One of the main issues that this integration has brought is ... -
Modular Design of KEM-Based Authenticated Key Exchange
(Peer reviewed; Journal article, 2023) -
Monitoring and Alerting in Offshore Maritime Environments: Requirements, State-of-the-Art, and Recommendations
(Bachelor thesis, 2024)Kongsberg Maritime, en leder innen maritim teknologi, trengte ny innsikt i overvåkningsløsninger for deres K-IMS-system i offshore-miljøer. Deres krav inkluderte å identifisere uautorisert tilgang, oppdage uønsket oppførsel ... -
Monitoring and Detecting Failures in Wide Area IoT Networks
(Master thesis, 2016)Low Power Wide Area Network technologies provide an infrastructure that facilitates development of wide area IoT applications. With this comes a need for a better understanding of how components in such applications should ...