• Post-Quantum Secure Biometric Systems 

      Bauspieß, Pia Victoria (Doctoral theses at NTNU;2024:226, Doctoral thesis, 2024)
      Biometrics, which is defined as the automated recognition of individuals based on their behavioural and biological characteristics, can be applied to increase the trust and usability of digital interactions. Due to their ...
    • Potential Cyber Threats, Vulnerabilities, and Protections of Unmanned Vehicles 

      Oruc, Aybars (Journal article; Peer reviewed, 2022)
    • Potential Value Adding Services for Mazemap's Platform for Indoor Navigation. 

      Helsvig, Karl Ivar (Master thesis, 2018)
      MazeMap is looking at new potential services to add value to their existing platform for indoor navigation. They are looking at two new additional services, namely indoor navigation for blind and vision impaired and ...
    • Power Analytic Attacks on CRYSTALS-Kyber 

      Håkegård, Erlend (Master thesis, 2023)
      Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi ...
    • Power Unavailability Reduction in Distribution Grid Fault Management with Entropy Minimization 

      Garau, Michele; Helvik, Bjarne Emil (Chapter, 2021)
      Smart automation is acquiring a high importance in current distribution systems. The high number of buses, the radial topology, the small number of sensors and automated devices, require new approaches in managing fault ...
    • PowerScan: A Framework for Dynamic Analysis and Anti-Virus Based Identification of Malware 

      Langerud, Thomas; Lillesand, Jøran Vagnby (Master thesis, 2008)
      This thesis describes the design and implementation of a framework, PowerScan, which provides the ability to combine multiple tools in the analysis of a malware sample. The framework utilizes XML configuration in order to ...
    • Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes 

      Mital, Nitish; Kralevska, Katina; Ling, Cong; Gündüz, Deniz (Journal article; Peer reviewed, 2019)
      A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized ...
    • Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm 

      Catak, Ferhat Özgur; Aydin, Ismail; Elezaj, Ogerta; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2020)
      The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains ...
    • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

      de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
      We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
    • Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification 

      Yildirim Yayilgan, Sule; Arifaj, Blend; Rahimpour, Masoomeh; Hardeberg, Jon Yngve; Ahmedi, Lule (Peer reviewed; Journal article, 2021)
      Skin cancer is a major public health problem, with millions newly diagnosed cases each year. Melanoma is the deadliest form of skin cancer, responsible for the most over 6500 deaths each year in the US, and the rates have ...
    • Precision Time Protocol under Synchronization Attack 

      Tørseth, Kristian (Master thesis, 2022)
      Precision Time Protocol IEEE 1588 (PTP) er en synkroniserings protokoll som brukes mye i industrielle kontroll systemer hvor man ønsker en synkroniserings presisjon under et nanosekund(< 0.000001 sekunder). Denne protokollen ...
    • Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models 

      Szekeres, Adam; Snekkenes, Einar Arthur (Chapter, 2019)
      The primary purpose of this study is to demonstrate how publicly observable pieces of information can be used to build various psychological profiles that can be utilized for the prediction of behavior within a risk analysis ...
    • Predicting likelihood of legitimate data loss in email DLP 

      Faiz, Mohamed Falah; Junaid, Arshad; Alazab, Mamoun; Shalaginov, Andrii (Journal article; Peer reviewed, 2019)
      The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ...
    • Predicting the Performance of a Spatial Gamut Mapping Algorithm 

      Bakke, Arne Magnus; Farup, Ivar; Hardeberg, Jon Yngve (Proceedings of SPIE;7241, Journal article; Peer reviewed, 2009)
      Gamut mapping algorithms are currently being developed to take advantage of the spatial information in an image to improve the utilization of the destination gamut. These algorithms try to preserve the spatial informa- ...
    • Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review 

      Matias, Igor; Garcia, Nuno; Pirbhulal, Sandeep; Felizardo, Virginie; Pombo, Nuno; Zacarias, Henriques; Sousa, Miguel; Zdravevski, Eftim (Peer reviewed; Journal article, 2021)
      Atrial Fibrillation (AF) is a type of arrhythmia characterized by irregular heartbeats, with four types, two of which are complicated to diagnose using standard techniques such as Electrocardiogram (ECG). However, and ...
    • Prediksjon av feil i det norske strømnettet 

      Heistad, Fredrik; Kristensen, William Andreas (Master thesis, 2019)
      Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ...
    • Prediksjon av feil i det norske strømnettet 

      Heistad, Fredrik; Kristensen, William Andreas (Master thesis, 2019)
      Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ...
    • Preface 

      Mjølsnes, Stig Frode (Lecture Notes in Computer Science;, Chapter, 2015)
      Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often ...
    • Prefrontally modulated vagal neuroimmunomodulation is associated with telomere length 

      Ask, Torvald Fossåen; Sütterlin, Stefan (Peer reviewed; Journal article, 2022)
      Background: Accumulated senescent cells are proposed to be one of the main drivers of age-related pathology such as dementia and cancer through disruption of tissue structure and function. We recently proposed the ...
    • Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security 

      Wen, Shao-Fang; Katt, Basel (Chapter, 2019)
      Learning software security is a big challenging task in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The traditional ...