Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 1896-1915 of 2594
-
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
(Peer reviewed; Journal article, 2022)Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the ... -
Resilience Analysis of Software-Defined Networks Using Queueing Networks
(Peer reviewed; Journal article, 2019)Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ... -
Resilience Analysis of Software-Defined Networks Using Queueing Networks
(Chapter, 2020)Software-Defined Networks (SDN) are being adopted widely and are also likely to be deployed as the infrastructure of systems with critical real-time properties such as Industrial Control Systems (ICS). This raises the ... -
Resilience of communication networks to random failures and disasters: An optimization perspective
(Peer reviewed; Journal article, 2020)Communication networks are subject to many challenges leading to single or multiple failures of its elements. Example failure scenarios include unintentional failures due to scheduled maintenance activities or massive ... -
Resilience of Infrastructure Networks Byzantine Consensus, Interdependencies, and Optimisation in Sparse Networks
(Doctoral theses at NTNU;2017:80, Doctoral thesis, 2017)The growing dependence on critical infrastructure systems demands highly available systems that provide secure, resilient, and efficient services, even in the presence of malicious attacks. This thesis investigates the ... -
Resilient Filesystem
(Master thesis, 2018)MICROSOFT developed a new Filesystem, REFS. This Resilient FileSystem is intended to replace NTFS, hence the importance and usage of REFS should increase over the next few years. Although we have been able to use REFS since ... -
Resilient internetwork routing over heterogeneous mobile military networks
(Journal article; Peer reviewed, 2015)Mobile networks in the military tactical domain, include a range of radio networks with very diverse characteristics and which may be employed differently from operation to operation. When interconnecting networks with ... -
Resource-aware Acoustic Event Classification
(Master thesis, 2019)Akustisk hendelse klassifisering (AEC) er en kollektiv samlingsbetegnelse for algoritmer som er i stand til å skille mellom ulike lydhendelser. AEC gjør at maskiner kan lære å gjenkjenne akustiske hendelser, og deretter ... -
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform
(Chapter, 2010)This paper presents the design and analysis of an area efficient Blue Midnight Wish compression function with digest size of 256 bits (BMW-256) on FPGA platforms. The proposed architecture achieves significant improvements ... -
Response Center Services: An Exploratory Study
(Peer reviewed; Journal article, 2022) -
A response to the European Data Protection Supervisor ‘Misunderstandings in Biometrics’ by the European Association for Biometrics
(Peer reviewed; Journal article, 2021)The intention of this position paper is to comment on the joint European Data Protection Supervisor (EDPS)-Agencia Española de Protección de Datos (aepd) publication ‘14 Misunderstandings with regard to Biometric Identification ... -
RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments
(Peer reviewed; Journal article, 2020)The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices ... -
Rethinking Independence in Safety Systems
(Chapter, 2024)The independence in safety systems ensures that the rest of the OT system possesses the ability to resume normal operation or revert to a safe state during a failure. The requirement was previously sustained by isolating ... -
Revealing the Dark Side of WebRTC Statistics Collected by Google Chrome
(Chapter, 2016)Google Chrome provides a built-in tool to collectreal-time session-related performance statistics of Web-basedReal-Time Communication (WebRTC). Although the Chromestatistics have a number of ... -
Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks
(Journal article; Peer reviewed, 2018)The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While ... -
Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations
(Peer reviewed; Journal article, 2022) -
Reverse Engineering Microprocessor Content Using Electromagnetic Radiation
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;2/2011, Doctoral thesis, 2011-11-28)Moore’s law has, for almost half a century, described a trend in which the number of transistors in integrated circuits have been doubled every year. Properties, such as processing speed, memory capacity and physical size ... -
Reverse engineering of ReFS
(Journal article; Peer reviewed, 2019)File system forensics is an important part of Digital Forensics. Investigators of storage media have traditionally focused on the most commonly used file systems such as NTFS, FAT, ExFAT, Ext2-4, HFS+, APFS, etc. NTFS is ... -
Reverse Engineering the Home Monitoring Unit in the Pacemaker Ecosystem
(Master thesis, 2022)Research on medical devices in the past has uncovered security vulnerabilities that threaten the safety and privacy of patients. Over the past decade, Internet of Things (IoT) devices, as well as medical devices, have ... -
Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)
(Peer reviewed; Journal article, 2023)