• Precision Time Protocol under Synchronization Attack 

      Tørseth, Kristian (Master thesis, 2022)
      Precision Time Protocol IEEE 1588 (PTP) er en synkroniserings protokoll som brukes mye i industrielle kontroll systemer hvor man ønsker en synkroniserings presisjon under et nanosekund(< 0.000001 sekunder). Denne protokollen ...
    • Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models 

      Szekeres, Adam; Snekkenes, Einar Arthur (Chapter, 2019)
      The primary purpose of this study is to demonstrate how publicly observable pieces of information can be used to build various psychological profiles that can be utilized for the prediction of behavior within a risk analysis ...
    • Predicting likelihood of legitimate data loss in email DLP 

      Faiz, Mohamed Falah; Junaid, Arshad; Alazab, Mamoun; Shalaginov, Andrii (Journal article; Peer reviewed, 2019)
      The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ...
    • Predicting the Performance of a Spatial Gamut Mapping Algorithm 

      Bakke, Arne Magnus; Farup, Ivar; Hardeberg, Jon Yngve (Proceedings of SPIE;7241, Journal article; Peer reviewed, 2009)
      Gamut mapping algorithms are currently being developed to take advantage of the spatial information in an image to improve the utilization of the destination gamut. These algorithms try to preserve the spatial informa- ...
    • Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review 

      Matias, Igor; Garcia, Nuno; Pirbhulal, Sandeep; Felizardo, Virginie; Pombo, Nuno; Zacarias, Henriques; Sousa, Miguel; Zdravevski, Eftim (Peer reviewed; Journal article, 2021)
      Atrial Fibrillation (AF) is a type of arrhythmia characterized by irregular heartbeats, with four types, two of which are complicated to diagnose using standard techniques such as Electrocardiogram (ECG). However, and ...
    • Prediksjon av feil i det norske strømnettet 

      Heistad, Fredrik; Kristensen, William Andreas (Master thesis, 2019)
      Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ...
    • Prediksjon av feil i det norske strømnettet 

      Heistad, Fredrik; Kristensen, William Andreas (Master thesis, 2019)
      Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ...
    • Preface 

      Mjølsnes, Stig Frode (Lecture Notes in Computer Science;, Chapter, 2015)
      Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often ...
    • Prefrontally modulated vagal neuroimmunomodulation is associated with telomere length 

      Ask, Torvald Fossåen; Sütterlin, Stefan (Peer reviewed; Journal article, 2022)
      Background: Accumulated senescent cells are proposed to be one of the main drivers of age-related pathology such as dementia and cancer through disruption of tissue structure and function. We recently proposed the ...
    • Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security 

      Wen, Shao-Fang; Katt, Basel (Chapter, 2019)
      Learning software security is a big challenging task in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The traditional ...
    • Preparedness Exercises for Cyber Attacks Against Industrial Control Systems in the Petroleum Industry 

      Skytterholm, Andrea Neverdal; Hotvedt, Guro (Master thesis, 2021)
      I petroleumsindustrien monitoreres og kontrolleres operasjoner av industrielle automasjons- og kontrollsystemer (IACS), også kjent som operasjonell teknologi (OT). IACS er kritisk for operasjonen av plattformen og for å ...
    • Preparedness Exercises for Cyber Attacks Against Industrial Control Systems in the Petroleum Industry 

      Hotvedt, Guro; Skytterholm, Andrea Neverdal (Master thesis, 2021)
      I petroleumsindustrien monitoreres og kontrolleres operasjoner av industrielle automasjons- og kontrollsystemer (IACS), også kjent som operasjonell teknologi (OT). IACS er kritisk for operasjonen av plattformen og for å ...
    • Preparing for cyber crisis management exercises 

      Østby, Grethe; Kowalski, Stewart James (Chapter, 2020)
      In this paper the authors discuss how to create a preparation schedule for ex-ercises (PSE) to support EXCON-teams and instructors for full-scaled com-bined crisis management and cyber-exercises. The process to create the ...
    • Preparing for cyber-incident exercises: Developing best practice within exercise control management (EXCON) 

      Bjørn Emil Selebø (Master thesis, 2022)
      Sammendrag De siste årene har det vært en stor økning i avanserte dataangrep mot både offentlige etater og private organisasjoner i Norge, noe som har ført til økt fokus på kompetanseheving og øving innen cyber- og ...
    • Presentation Attack and Detection in Keystroke Dynamics 

      Ness, Jonathan (Master thesis, 2017)
      Biometric authentication is already making an entry in consumer security, notably with face and fingerprint recognition. Keystroke dynamics is an aspect of behavioral biometrics based on typing behavior to verify the ...
    • Presentation Attack Resistant Fingerprint Biometrics –using Optical Coherence Tomography 

      Sousedik, Ctirad (Doctoral theses at NTNU;2018:17, Doctoral thesis, 2018)
    • Preserving Steganography Information Over Image Transformations 

      in't Veld, Kristian (Master thesis, 2022)
      Steganografi er kunsten å skjule informasjon i andre medium. Innen bildesteganografi blir skjulte meldinger gjemt i bilder som ser normale ut for det blotte øye, men som en mottaker kan hente ut den skjulte meldingen fra. ...
    • Preventing and Mitigating Client-Side Vulnerabilities of Smart Card Based e-ID Applications 

      Engen, Svein Roger (Master thesis, 2012)
      ENGELSK: More and more companies are digitizing their services, this is because their customers demand it. An efficient way for handling the authentication process is to use service providers that offer this. Some service ...
    • Preventing Data Poisoning Attacks By Using Generative Models 

      Aladag, Merve; Catak, Ferhat Özgur; Gul, Ensar (Chapter; Peer reviewed, 2019)
      At the present time, machine learning methods have been becoming popular and the usage areas of these methods have also increased with this popularity. The machine learning methods are expected to increase in the cyber ...
    • Priming For Success: A Digital Service's Journey to Market 

      Trinh, Duy Tien (Master thesis, 2019)
      Hotellgjester ber om tjenester av mer personlig grad, der innendørskart kan være en nøkkelkomponent. Likevel er hotellbransjen en rigid og konservativ industri, og har hittil vært en sen implementør av ny teknologi. MazeMap ...