Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1736-1755 av 2578
-
Post-Quantum Secure Biometric Systems
(Doctoral theses at NTNU;2024:226, Doctoral thesis, 2024)Biometrics, which is defined as the automated recognition of individuals based on their behavioural and biological characteristics, can be applied to increase the trust and usability of digital interactions. Due to their ... -
Potential Cyber Threats, Vulnerabilities, and Protections of Unmanned Vehicles
(Journal article; Peer reviewed, 2022) -
Potential Value Adding Services for Mazemap's Platform for Indoor Navigation.
(Master thesis, 2018)MazeMap is looking at new potential services to add value to their existing platform for indoor navigation. They are looking at two new additional services, namely indoor navigation for blind and vision impaired and ... -
Power Analytic Attacks on CRYSTALS-Kyber
(Master thesis, 2023)Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi ... -
Power Unavailability Reduction in Distribution Grid Fault Management with Entropy Minimization
(Chapter, 2021)Smart automation is acquiring a high importance in current distribution systems. The high number of buses, the radial topology, the small number of sensors and automated devices, require new approaches in managing fault ... -
PowerScan: A Framework for Dynamic Analysis and Anti-Virus Based Identification of Malware
(Master thesis, 2008)This thesis describes the design and implementation of a framework, PowerScan, which provides the ability to combine multiple tools in the analysis of a malware sample. The framework utilizes XML configuration in order to ... -
Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes
(Journal article; Peer reviewed, 2019)A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized ... -
Practical Implementation of Privacy Preserving Clustering Methods Using a Partially Homomorphic Encryption Algorithm
(Journal article; Peer reviewed, 2020)The protection and processing of sensitive data in big data systems are common problems as the increase in data size increases the need for high processing power. Protection of the sensitive data on a system that contains ... -
Practical Isogeny-Based Key-Exchange with Optimal Tightness
(Journal article; Peer reviewed, 2021)We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ... -
Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification
(Peer reviewed; Journal article, 2021)Skin cancer is a major public health problem, with millions newly diagnosed cases each year. Melanoma is the deadliest form of skin cancer, responsible for the most over 6500 deaths each year in the US, and the rates have ... -
Precision Time Protocol under Synchronization Attack
(Master thesis, 2022)Precision Time Protocol IEEE 1588 (PTP) er en synkroniserings protokoll som brukes mye i industrielle kontroll systemer hvor man ønsker en synkroniserings presisjon under et nanosekund(< 0.000001 sekunder). Denne protokollen ... -
Predicting CEO Misbehavior from Observables: Comparative Evaluation of Two Major Personality Models
(Chapter, 2019)The primary purpose of this study is to demonstrate how publicly observable pieces of information can be used to build various psychological profiles that can be utilized for the prediction of behavior within a risk analysis ... -
Predicting likelihood of legitimate data loss in email DLP
(Journal article; Peer reviewed, 2019)The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ... -
Predicting the Performance of a Spatial Gamut Mapping Algorithm
(Proceedings of SPIE;7241, Journal article; Peer reviewed, 2009)Gamut mapping algorithms are currently being developed to take advantage of the spatial information in an image to improve the utilization of the destination gamut. These algorithms try to preserve the spatial informa- ... -
Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review
(Peer reviewed; Journal article, 2021)Atrial Fibrillation (AF) is a type of arrhythmia characterized by irregular heartbeats, with four types, two of which are complicated to diagnose using standard techniques such as Electrocardiogram (ECG). However, and ... -
Prediksjon av feil i det norske strømnettet
(Master thesis, 2019)Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ... -
Prediksjon av feil i det norske strømnettet
(Master thesis, 2019)Utviklingen av smartgrid har ført til en enorm vekst i antallet sensorer og smarte målere i strømnettet. Disse enhetene tilgjengeliggjør store mengder data. Samtidig har det de siste årene skjedd store fremskritt innen ... -
Preface
(Lecture Notes in Computer Science;, Chapter, 2015)Hackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often ... -
Prefrontally modulated vagal neuroimmunomodulation is associated with telomere length
(Peer reviewed; Journal article, 2022)Background: Accumulated senescent cells are proposed to be one of the main drivers of age-related pathology such as dementia and cancer through disruption of tissue structure and function. We recently proposed the ... -
Preliminary Evaluation of an Ontology-Based Contextualized Learning System for Software Security
(Chapter, 2019)Learning software security is a big challenging task in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The traditional ...