• Trends in Development of Databases and Blockchain 

      Raikwar, Mayank; Gligoroski, Danilo; Velinov, Goran (Chapter, 2020)
      This work is about the mutual influence between two technologies: Databases and Blockchain. It addresses two questions: 1. How the database technology has influenced the development of blockchain technology?, and 2. How ...
    • Triage of PE-files through divide-and-conquer clustering 

      Bae, Sturla Høgdahl (Master thesis, 2020)
      Antallet nye, unike ondsinnede filer som oppdages hver dag øker stadig. Grunnen til at det oppdages så mange nye filer, er ikke at det lages så mange helt nye varianter av skadevare hver dag, men fordi små endringer blir ...
    • Trust Management for a Smart Card Based Private eID Manager 

      Chen, Shi (Master thesis, 2016)
      Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ...
    • Trust Management in Fog Computing 

      Dybedokken, Tuva Selstad (Master thesis, 2017)
      With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In fog computing allows for processing data along ...
    • Trusted secure service design: Enhancing trust with the future sim-cards 

      Vilarinho, Thomas Carlyle (Master thesis, 2009)
      The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this ...
    • Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT 

      Stach, Christoph; Gritti, Clémentine; Przytarski, Dennis; Mitschang, Bernhard (Chapter, 2020)
      A large number of food scandals (e. g., falsely declared meat or non-compliance with hygiene regulations) are causing considerable concern to consumers. Although Internet of Things (IoT) technologies are used in the food ...
    • TULIPP: Towards Ubiquitous Low-power Image Processing Platforms 

      Ruf, Boitumelo; Muddukrishna, Ananya; Göhringer, Diana; Schuchert, Tobias; Ehrenstråhle, Carl; Paolillo, Antonio; Marty, Fabien; Christensen, Flemming; Tchouchenkov, Igor; Bernard, Guillaume; Kalms, Lester; Pons, Carlota; Kjeldsberg, Per Gunnar; Rodriguez, Ben; Jahre, Magnus; Duhem, Francois; Peterson, Magnus; Millet, Philippe; Kalb, Tobias; Lemer, Christian (IEEE International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (IC-SAMOS);, Chapter, 2016)
      Many industrial domains rely on vision-based applications which require to comply with severe performance and embedded requirements. TULIPP will develop a reference platform, which consists of a hardware system, a tool ...
    • Turning a vulnerability into an asset: Accelerating Facial Identification with Morphing 

      Drozdowski, Pawel; Rathgeb, Christian; Busch, Christoph (Chapter, 2019)
      In recent years, morphing of facial images has arisen as an important attack vector on biometric systems. Detection of morphed images has proven challenging for automated systems and human experts alike. Likewise, in recent ...
    • Two key PIN entry method for public access terminals: evaluated with a method using principles from universal design and safety 

      Krokan, Einar (Master thesis, 2012)
      This thesis takes a look at universal design and it’s principles to test a new personal identity number (PIN) entry method with public access terminals. We argue that universal design can not only make the evaluated ...
    • Type^2: A Secure and Seamless Biometric Two-Factor Authentication Protocol Using Key stroke Dynamics 

      Bauspieß, Pia; Bours, Patrick Adrianus; Rathgeb, Christian; Busch, Christoph (Peer reviewed; Journal article, 2023)
    • The U-Net Family for Epicardial Adipose Tissue Segmentation and Quantification in Low-Dose CT 

      Liu, Lu; Ma, Runlei; van Ooijen, Peter M. A.; Oudkerk, Matthijs; Vliegenthart, Rozemarijn; Veldhuis, Raymond Nicolaas Johan; Brune, Christoph (Peer reviewed; Journal article, 2023)
      Epicardial adipose tissue (EAT) is located between the visceral pericardium and myocardium, and EAT volume is correlated with cardiovascular risk. Nowadays, many deep learning-based automated EAT segmentation and quantification ...
    • UI0T-FMT: Universal format for collection and aggregation of data from smart devices 

      Seljeseth, Mats Didriksen (Master thesis, 2020)
      Informasjons teknologi (IT) har blitt et særdeles omfattende del av menneskets hverdag. Hverdagslige apparater og dingser har blitt mer integrert med Smart Teknologi, som gjør det enklere for individet å bruke de. Med andre ...
    • Uncertainty-Aware Autonomous Sensing with Deep Reinforcement Learnings 

      Murad, Abdulmajid (Doctoral theses at NTNU;2023:64, Doctoral thesis, 2023)
      The goal of many Internet of Things (IoT) sensing applications, such as environmental monitoring, is to support decision-making by providing valuable information about various phenomena. One approach to achieve this goal ...
    • Understanding and Simulation of Attacks in Power Networks 

      Jafari Mohammad Reza (Bachelor thesis, 2022)
      Etterspørselen etter vedlikehold og reinvestering i kraftsystemet vokser etter hvert som krafttransformatorene eldes. For å hjelpe beslutningstaking er det for tiden mangel på egnede data og analyseteknikker for å estimere ...
    • Understanding Attribute-based Access Control for Modelling and Analysing Healthcare Professionals’ Security Practices 

      Nweke, Livinus Obiora; Yeng, Prosper; Wolthusen, Stephen; Yang, Bian (Journal article; Peer reviewed, 2020)
      Abstract: In recent years, there has been an increase in the application of attribute-based access control (ABAC) in electronic health (e-health) systems. E-health systems are used to store a patient’s electronic version ...
    • Understanding Data Analysis in an End-to-End IoT System 

      Schei, Sindre (Master thesis, 2016)
      The Internet of Things (IoT) is known as the concept of connecting everyday physical devices to the Internet. It is natural to assume that the popularity and development within this field will increase in the following years. ...
    • Understanding digital platform evolution using compartmental models 

      Szalkowski, Gabriel Andy; Mikalef, Patrik (Peer reviewed; Journal article, 2023)
      Due to the growing impact of digital platforms, it is increasingly important to understand their evolution through mathematical models. As their value is dependent on their user base, we present an improved perspective on ...
    • UNDERSTANDING INFORMATION SECURITY INCIDENT MANAGEMENT PRACTICES:A case study in the electric power industry 

      Line, Maria Bartnes (Doctoral thesis at NTNU;2015:241, Doctoral thesis, 2015)
      With the implementation of smarter electric power distribution grids follows new technologies, which lead to increased connectivity and complexity. Traditional IT components – hardware, firmware, software – replace ...
    • Understanding network performance bottlenecks 

      Nore, Haakon Løchen (Master thesis, 2014)
      In this thesis we look into network performance bottlenecks and how end-to-end delivery of data is affected by the performance of the network.The last years, the buzzword: the bufferbloat issue has gotten much attention ...
    • Understanding Situation Awareness in SOCs, A Systematic Literature Review 

      Ofte, Håvard Jakobsen; Katsikas, Sokratis (Peer reviewed; Journal article, 2022)
      Situation awareness is shown through human factors research to be a valuable construct to understand and improve how humans perform while operating complex systems in critical environments. Within cyber security one such ...