• No Silver Bullet: QoE Metrics, QoE Fairness, and User Diversity in the Context of QoE Management 

      Hossfelt, Tobias; Skorin-Kapov, Lea; Heegaard, Poul Einar; Varela, Martin (Chapter, 2017)
      Managing QoE is one of the most interesting direct applications of workable QoE models. Indeed, being able to predict how users perceive the quality of a service allows the service provider(s) to optimize its delivery, ...
    • Non-Asymptotic Delay Bounds for Multi-Server Systems with Synchronization Constraints 

      Fidler, Markus; Walker, Brenton; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      Parallel computing has become a standard tool with architectures such as Google MapReduce, Hadoop, and Spark being broadly used in applications such as data processing and machine learning. Common to these systems are a ...
    • Non-markovian survivability assessment model for infrastructure wireless networks 

      Xie, Lang; Heegaard, Poul Einar; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      Network design and operation of a mobile network infrastructure, especially its access points, need to consider survivability as a fundamental requirement. Quantifiable approaches to survivability analysis of such ...
    • Non-technical Sources of Errors When Handling Digital Evidence within a Criminal Investigation 

      Sunde, Nina (Master thesis, 2017)
      Digital evidence is relevant to almost every criminal case. Like other lines of evidence, they serve the purpose of establishing the indisputable facts, and they also shed light on the suspects motivation and purpose of ...
    • Non-technical Sources of Errors When Handling Digital Evidence within a Criminal Investigation 

      Sunde, Nina (Master thesis, 2017)
      Digital evidence is relevant to almost every criminal case. Like other lines of evidence, they serve the purpose of establishing the indisputable facts, and they also shed light on the suspects’ motivation and purpose of ...
    • Novel and Efficient Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz; Eskeland, Sigurd; Yang, Bian (Peer reviewed; Journal article, 2024)
      Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such ...
    • A Novel hybrid IDS based on modified NSGAII-ANN and Random Forest 

      Golrang, Anahita; Golrang, Alale; Yildirim Yayilgan, Sule; Elezaj, Ogerta (Peer reviewed; Journal article, 2020)
      Machine-learning techniques have received popularity in the intrusion-detection systems in recent years. Moreover, the quality of datasets plays a crucial role in the development of a proper machine-learning approach. ...
    • NPT Online Broadband Test Tool 

      Hansen, Lars-Petter Gunhildsberg; Østhus, Ivar Conradi (Master thesis, 2009)
      Many broadband subscribers suspect that they do not receive the data rate they are paying for. In order to verify that the broadband connection is compliant with the product purchased, subscribers can go on-line and choose ...
    • NTNU Threat Total 

      Barstad, Johannes Madsen; Henriksen, Odin Korsfur; Kjærandsen, Jonas; Stuen, Peder Andreas (Bachelor thesis, 2022)
      Threat Total er en full stack web applikasjon med et brukervennlig grensesnitt, som bruker NTNUs farger og logoer. Applikasjonens backend er en robust Golang-server med caching i Redis, som reduserer lasten på våre tredjeparts ...
    • Nytt intranett ved NTNU: Sluttrapport fra forprosjektet 

      Hovde, Per; Myrbostad, Kyrre; Sætre, Christine Anne; Tilset, Hans Donali; Kvenild, Tone (Research report, 2010)
      Formålet med forprosjektet var å se nærmere på hva et nytt intranett bør omfatte og hvordan det kan realiseres. Sluttrapporten oppsummerer forprosjektets tanker om hva det nye intranettet ved NTNU, Innsida 2.0 skal bestå ...
    • Nytt konfigurasjonssystem for Linux-servere 

      Huseby, Audun; Jernberg, Stein Ove; Osborg, Andreas (Bachelor thesis, 2018)
      Unix-gruppen ved NTNUs seksjon for IT-drift skal finne et nytt konfigurasjonssystem for styring av Linux-maskiner. Det skal erstatte dagens implementasjon av CFEngine 2. En oppgradering til versjon 3 fra samme leverandør ...
    • Nær naturlige stereoskopiske bilder og krav til oppløsning 

      Heiberg, Erlend (Master thesis, 2007)
      Stadig raskere nettverk samt bedre og billigere maskinvare åpner for nye muligheter innen kommunikasjon over nett. På lydfronten har vi kommet langt, men bildekvaliteten er fremdeles langt unna det vi kan kalle nær naturlige ...
    • Obfuscating Malware through Cache Memory Architecture Features 

      Sayin, Caglar (Master thesis, 2014)
      There is no doubt that malicious software (malware) is one of the most important threat in computer security. With increasing of the information systems and computer network usage in the industrial and governmental ...
    • Oblivious RAM in practice 

      Thoresen, Olav Sortland (Master thesis, 2019)
      Målet med denne masteroppgaven er å studere ytelsen til nåværende Oblivious RAM (ORAM) løsninger og undersøke hvor praktiske de er i et skylagrings-scenario. For å gjøre dette ble tre ORAM løsninger (ObliviStore, CURIOUS ...
    • Observable Effects of Selected Phasor Measurement Unit Time Delay Attacks 

      Sivertsen, Gustav Oskar (Master thesis, 2023)
      Det tradisjonelle elektriske kraftnettet, som leverer elektrisk kraft til konsumenter, er i ferd med å bli transformert fra et system som er lukket og sentralstyrt et nettverksstyrt automatisert system for å levere elektrisk ...
    • Observation-Resistant Multifactor Multimodal Authentication 

      Mallasvik, Aleksander Furnes (Master thesis, 2010)
      ENGELSK: This thesis investigates the use of hand gestures as an additional modality in authentication schemes, to thwart the risk of observation (shoulder surfing) attacks. We used the accelerometer already embedded in ...
    • Obtaining precision-recall trade-offs in fuzzy searches of large email corpora 

      Porter, Kyle; Petrovic, Slobodan (Journal article; Peer reviewed, 2018)
      Fuzzy search is often used in digital forensic investigations to find words that are stringologically similar to a chosen keyword. However, a common complaint is the high rate of false positives in big data environments. ...
    • Obtaining situational awareness using Wi-Fi geolocation 

      Rohde Garder, Henriette Kolby (Master thesis, 2020)
      Det overordnede målet for denne masteroppgaven var å undersøke om bruk av geolokaliseringsteknikker (basert på Wi-Fi og rogue-tilgangspunkter) kan være en praktisk måte å øke situasjonforståelse ved å lokalisere og spore ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • Offline Signature Verification using GED on Labelled Graphs 

      Do, Duy Thomas (Master thesis, 2021)
      Grafer er kraftige representasjonsverktøy som kan brukes til oppgaver som offline signaturverifisering. Selv om grafer har vært tidlig introdusert, er det bare noen få av de nyeste systemene som tar i bruk grafer, og ingen ...