• Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security 

      Wangen, Gaute; Shalaginov, Andrii (Chapter, 2016)
      Achieving the quantitative risk assessment has long been an elusive problem in information security, where the subjective and qualitative assessments dominate. This paper discusses the appropriateness of statistical and ...
    • A Quantitative Security Evaluation and Analysis Model for Web Applications Based on OWASP Application Security Verification Standard 

      Wen, Shao-Fang; Katt, Basel (Peer reviewed; Journal article, 2023)
      In today's digital world, web applications are popular tools used by businesses. As more and more applications are deployed on the web, they are seen as increasingly attractive targets by malicious actors eager to exploit ...
    • Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework 

      Khan, Muhammad Imran; Foley, Simon N.; O'Sullivan, Barry (Peer reviewed; Journal article, 2020)
      Little attention has been paid to the measurement of risk to privacy in Database Management Systems, despite their prevalence as a modality of data access. This paper proposes PriDe, a quantitative privacy metric that ...
    • A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises 

      Chaudhary, Sunil; Gkioulos, Vasileios; Katsikas, Sokratis (Journal article; Peer reviewed, 2023)
      The proliferation of information and communication technologies in enterprises enables them to develop new business models and enhance their operational and commercial activities. Nevertheless, this practice also introduces ...
    • A Questionnaire to Assess Virtual Conference Participation Experience 

      Hohlfeld, Oliver; De Moor, Katrien; Guse, Dennis (Peer reviewed; Journal article, 2021)
      This tools track paper presents the design of a questionnaire methodology to assess the participants experience of virtual conferences. This survey approach consists of a preconference questionnaire assessing participation ...
    • Radar imaging of small objects closely below the earth surface 

      Eide, Egil S. (Doctoral thesis, 2000)
      This dissertation focuses on subsurface imaging of objects closely below the ground surface using ground penetrating radar (GPR). The main purpose is to detect and image man-made objects such as buried landmines or subsurface ...
    • Radio Access Technology Selection in Heterogeneous Wireless Networks for Revenue Maximization 

      Khloussy, Elissar (Doctoral theses at NTNU;2018:163, Doctoral thesis, 2018)
      Wireless networks have witnessed a great success recently. The number of users along with the traffic demands have grown exponentially. Therefore, the wireless resources of a single Radio Access Technology (RAT) might not ...
    • Rammeverk for formulering av portable krav til informasjonssikkerhet 

      Ween, Morten (Master thesis, 2005)
      NORSK: Når data skal utveksles i et nettverk, eller det skal gis delt tilgang til data fra forskjellige systemer tilknyttet nettverket, vil aktører i forskjellige deler av nettet håndtere og beskrive sikkerhetsspørsmål ...
    • Rate Adaptive Video Streaming over Wireless Networks: Explained & Explored 

      Haukaas, Torgeir (Master thesis, 2007)
      In the search for improved methods of transporting real time video and VoIP over the Internet, new rate control mechanisms need to be developed and standardized. Ongoing research in the field has led to several new protocol ...
    • Rate vulnerability reducing measures for home offices based on a cost effectiveness analysis 

      Lieungh, Steinar (Master thesis, 2005)
      NORSK: Stadig flere bedrifter tar i bruk hjemmekontorløsninger slik at de ansatte kan få muligheten til å jobbe hjemmefra, en eller flere dager i uken. Ved å flytte kontorene ut fra bedriften og hjem til de ansatte, ...
    • Reading the Electricity Meter 

      Aker, Ole-Magnus Røysted (Master thesis, 2014)
      The consumers in today's electricity market need to report their electricity consumption usually every third month, and occasionally even more often. The new paradigm in Norway's electricity system will be the use of smart ...
    • Real time detection and analysis of PDF-files 

      Borg, Knut (Master thesis, 2013)
      ENGLISH: The PDF-file format is a very popular format to perform attacks with due to the format being quite versatile. A PDF-file can be used as direct attacks against specific targets like the government, the army or ...
    • Real-time Communication in a Ubiquitous Office Environment 

      Randby, Johan Martin (Master thesis, 2008)
      Combining multiple fixed and mobile terminals to create a real-time communication session can be troublesome. Consider the following scenario: Alice is at work, and wants to place a video call to Tom, who is not currently ...
    • Real-Time End-User Service Composition Using Google Wave 

      Halvorsen, Espen Herseth (Master thesis, 2010)
      This thesis explores Wave, a brand new communication and collaboration platform, from the perspective of end user service composition. A description of the different frameworks that are available and a study of how these ...
    • Real-Time Event Correlation for Windows Event Logs 

      Ingesen, Martin (Master thesis, 2020)
      Nye sårbarheter og angrepsvektor blir funnet hver dag. Cyberangrep kan kritisk skade og påvirke bedrifter som blir angrepet. Mange av disse truslene fokuserer på å penetrere nettverket til bedriften for å stjele verdifull ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • REAL-TIME NETWORK INTRUSIONPREVENTION 

      Haslum, Kjetil (Doctoral Theses at NTNU, 1503-8181; 168, Doctoral thesis, 2010)
      It is not economically or technically feasible to make complex computersystems that are completely secure. New attacks are constantly developedby attackers and the security situation can therefore rapidly change. In orderto ...
    • Real-time people counting system using a single video camera 

      Lefloch, Damien; Cheikh, Faouzi Alaya; Hardeberg, Jon Yngve; Gouton, Pierre; Picot-Clemente, Romain (Proceedings of SPIE;6811, Journal article; Peer reviewed, 2008)
      There is growing interest in video-based solutions for people monitoring and counting in business and security applications. Compared to classic sensor-based solutions the video-based ones allow for more versatile ...
    • Real-Time Phase Ambiguity Resolution in Global Navigation Satellite Systems 

      Svendsen, Jon Glenn (Dr. ingeniøravhandling, 0809-103X; 2001:104, Doctoral thesis, 2002)
      This dissertation focuses on real-time carrier phase ambiguity resolution for high precision solutions in Global Navigation Satellite Systems (GNSS). In order to exploit the full accuracy potential, one must be able to ...
    • Realizing Context-Aware Services through Intelligent Mobile Data Analysis 

      Oplenskedal, Magnus Karsten (Doctoral theses at NTNU;2022:234, Doctoral thesis, 2022)
      In recent years there has been a rapid development of mobile technologies, Internet of Things (IoT) and cellular network infrastructures. In combination with the fast evolution of data analysis, and particularly within ...