Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2356-2375 av 2628
-
The potential impact of M2M technology in supply chains
(Master thesis, 2009)Currently more and more companies have started to introduce different types of technology to their supply chains in order to improve product flow and achieve higher returns. Research has shown that glitches in a firm?s ... -
The Power of Composition: Abstracting a Multi-Device SDN Data Path Through a Single API
(Journal article; Peer reviewed, 2019)Software Defined Networking aims to separate network control and data plane by moving the control logic from network elements into a logically-centralized controller. Using a well-defined, unified control-channel protocol, ... -
The Rebound Effect: A Simulation Model of Telecommuting
(Master thesis, 2014)This thesis aims to highlight the relationship between telecommuting and the rebound effect with respect to greenhouse gas emissions. This was done by gathering and analyzing the latest research from various fields that ... -
The reliability of clocks as digital evidence under low voltage conditions
(Journal article; Peer reviewed, 2018)Battery powered electronic devices like mobile phones are abundant in the world today, and such devices are often subject to digital forensic examinations. In this paper, we show that the assumptions that clocks are close ... -
The Risks of Marine Cloud Computing
(Master thesis, 2017)The maritime industry has an increasing reliance on information and communication technology (ICT) systems to ensure efficient operations, moving their threat picture into the cyber domain. Meanwhile, cloud computing has ... -
The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism
(Journal article; Peer reviewed, 2015)The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document ... -
The role of trust when implementing Network Based Defence in the Norwegian Armed Forces
(Master thesis, 2017)The Norwegian Armed Forces are supposed to implement Network Based Defence within the next couple of decades to achieve information superiority and to enable speed of command during operations. The process of implementing ... -
The Security Awareness of Smart Home Users in Norway
(Master thesis, 2020)Et smarthus kan være et relativt nytt konsept for mange. Under ideelle omstendigheter bør samhandling mellom brukere og smarthusapparater gjøres sikkert, eller i det minste med en viss grad av risikoforståelse. Imidlertid ... -
The Socioeconomic Impacts of Broadband Utilization in the Accommodation Sector in Norway
(Master thesis, 2011)Broadband technology has in recent years experienced a substantial growth, and is still rapidly evolving. Many new kinds of content-rich and bandwidth demanding broadband Internet applications have emerged, aiming to make ... -
The study of keyword search in open source search engines and digital forensics tools with respect to the needs of cyber crime investigations
(Master thesis, 2017)This master thesis consists of both a theoretical and practical part. In the theoretical part of the thesis are three main parts of study: 1) Exploration of experimental search methodologies used in a Digital forensics ... -
The Success of Digital Platforms: A Comparative Case Analysis of the Industry’s Knowledge, Strategies and Challenges in Creating, Maintaining and Developing Digital Platforms
(Master thesis, 2019)Behovet for å gjennomføre transaksjoner med andre mennesker har alltid vært en essensiell del av menneskets historie. Fra tidenes morgen har mennesker møttes ved markedsplasser for å handle varer, eller funnet sin partner ... -
The Success of Digital Platforms: A Comparative Case Analysis of the Industry’s Knowledge, Strategies and Challenges in Creating, Maintaining and Developing Digital Platforms
(Master thesis, 2019)Behovet for å gjennomføre transaksjoner med andre mennesker har alltid vært en essensiell del av menneskets historie. Fra tidenes morgen har mennesker møttes ved markedsplasser for å handle varer, eller funnet sin partner ... -
The Tension between Anonymity and Privacy
(Journal article; Peer reviewed, 2018)Privacy in the context of information and data is often defined in terms of anonymity, particularly in regulations such as the GDPR. Operationally, it is appealing to define privacy in terms of computable data properties ... -
The Uncertainty of Decisions in Measurement Based Admission Control
(Doktoravhandlinger ved NTNU, 1503-8181; 2010:218, Doctoral thesis, 2010)Most real-time voice and video applications are delay/loss sensitive but relaxed in the sense that they can tolerate some packet loss/delay. Using this information, network utilization can be greatly improved by ... -
The use of the Network Layer Packet Redundancy Scheme in the OpMiGua hybrid network
(Master thesis, 2007)The OpMiGua hybrid network has been proposed as viable migration approach from circuit switched all-optical networks to 3rd generation packet based optical networks. A special feature in the OpMiGua network compared with ... -
The Way Towards a Robust, Cost-Effective, and Future Proof National Mobile Network Infrastructure
(Master thesis, 2015)The increased use of mobile devices and the introduction of smartphones have changed the way people communicate. Over the last decade, mobile networks have become a critical infrastructure. Private individuals, governments ... -
The Wireless Tram: Providing Wireless Trondheim/Wi-Fi coverage using mobile WiMAX as backhaul
(Master thesis, 2008)In spring 2008, a pre-mobile WiMAX network is installed in Trondheim. Its purpose is to cover the tram line and provide wireless backhaul to a Wi-Fi hotspot inside the tram, thus providing Internet access to travelling ... -
THEIA, the User Interaction Archiver
(Bachelor thesis, 2015)In this thesis, we explore the logging of user interaction on Android devices targeted at the consumer market. We show that logging touch interaction is not possible without modifications of the Android operating system, ... -
Thermal imaging of ear biometrics for authentication purposes
(Master thesis, 2008)Authentication is a much used measure in order to keep impostors from getting access to things or places that they are not supposed to get access to. Passwords/phrases, tokens, keys and the like have been used since ... -
Threat Analysis for Smart Homes
(Journal article; Peer reviewed, 2019)The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments ...