Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1539-1558 av 2626
-
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking
(Peer reviewed; Journal article, 2021)Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability ... -
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
(Peer reviewed; Journal article, 2023)Reliable authentication of individuals is the foundation of trusted digital interaction. Biometrics lend themselves ideally to this goal. However, biometric data must be protected under computation according to European ... -
Multi Protocol Label Switching Transport Profile (MPLS-TP) in OpMiGua hybrid network
(Master thesis, 2010)This thesis presents the combination of MPLS-TP protocol with an integrated hybridnetwork, the Opmigua network. It is presented that the MPLS-TP protocol is applicableand follows all the requirements to be compatible with ... -
Multi-biometric Identification with Cascading Database Filtering
(Journal article, 2020)The growing scale and number of biometric deployments around the world necessitates research into technologies which facilitate fast identification queries and high discriminative power. In this context, this article ... -
Multi-class hate speech detection in the Norwegian language using FAST-RNN and multilingual fine-tuned transformers
(Journal article; Peer reviewed, 2024)The growth of social networks has provided a platform for individuals with prejudiced views, allowing them to spread hate speech and target others based on their gender, ethnicity, religion, or sexual orientation. While ... -
A Multi-Discipline Approach for Enhancing Developer Learning in Software Security
(Doctoral theses at NTNU;2020:151, Doctoral thesis, 2020)Building secure software is challenging. Developers should possess proper security knowledge and skills so that they can resist security attacks and implement security countermeasures effectively. However, the lack of ... -
Multi-factor Authentication in Tactical Systems
(Bachelor thesis, 2024)Kongsberg Defence & Aerospace (KDA) er Norges ledende leverandør av forsvars- og romfastsystemer. Sikkerheten i disse systemene er særdeles viktig. Sikkerhetsstandarden er allerde høy, men KDA ønsker å ha en fremoverlent ... -
Multi-feature Multimodal Biometric Recognition Based on Quaternion Locality Preserving Projection
(Peer reviewed; Journal article, 2019)This paper proposed Quaternion locality preserving projection (QLPP) for multi-feature multimodal biometric recognition. Multi-features fill the real part or the three imaginary parts of quaternion to constitute the ... -
Multi-Objective Differential Evolution for Automatic Clustering with Application to Micro-Array Data Analysis
(Journal article; Peer reviewed, 2009)This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performances of two multi-objective variants of DE ... -
The multi-objective feature selection in Android malware detection system
(Peer reviewed; Journal article, 2021)The Android operating system boosts a global market share over the previous years, which has made it the most popular operating system in the world. Recently, Android has become the target of attacks by cybercriminals ... -
Multi-paradigmatic approaches in cybersecurity economics
(Peer reviewed; Journal article, 2021)In cybersecurity economics, the selection of a particular methodology is a matter of interest and importance for the researchers. Methodologically sophisticated research forms an essential basis for understanding the ... -
Multi-site Federation For Cyber Range
(Master thesis, 2023)Organisasjoner eier vanligvis en viss kapital i infrastruktur fordelt på flere tippesider. En grunnleggende utfordring ligger imidlertid i å optimalisere delingen og utnyttelse av eksisterende infrastruktur og riktig ... -
A Multidimensional Cyber Defence Exercise: Emphasis on Emotional, Social and Cognitive Aspects
(Peer reviewed; Journal article, 2023)Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defence Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, ... -
Multilevel Fusion of Multispectral Images to Detect the Artificially Ripened Banana
(Journal article, 2023) -
Multilingual Audio-Visual Smartphone Dataset and Evaluation
(Peer reviewed; Journal article, 2021)Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging ... -
Multilingual Voice Impersonation Dataset and Evaluation
(Chapter, 2021)Well-known vulnerabilities of voice-based biometrics are impersonation, replay attacks, artificial signals/speech synthesis, and voice conversion. Among these, voice impersonation is the obvious and simplest way of attack ... -
Multimedia Distribution Networks and the Aeetes Project
(Master thesis, 2006)This thesis provides an introduction to the field of Multimedia Distribution Networks (MDN) and is written as the first part the Aeetes Project. It compares potential MDN architectures and technologies, and makes a proposal ...