Now showing items 2376-2395 of 2628

    • Threat Analysis in Dynamic Environments: The Case of the Smart Home 

      Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Chapter, 2019)
      The rapid advancement of information and communication technologies has fostered the development and deployment of complex interrelated systems, many of which also present highly dynamic operational characteristics. These ...
    • Threat mitigation and national security: A mixed methods study of perceptions on cyber security information sharing among Norwegian organizations 

      Amundsen, Mikkel; Sunde, Fanny Chaba (Master thesis, 2022)
      Norske virksomheter blir i økende grad utsatt for målrettede cyberangrep som forsterker behovet for en helhetlig tilnærming til nasjonal sikkerhet. I dagens cyberlandskap har nasjonal sikkerhet i stor grad blitt ...
    • Threat mitigation and national security: A mixed methods study of perceptions on cyber security information sharing among Norwegian organizations 

      Amundsen, Mikkel; Sunde, Fanny Chaba (Master thesis, 2022)
      Norske virksomheter blir i økende grad utsatt for målrettede cyberangrep som forsterker behovet for en helhetlig tilnærming til nasjonal sikkerhet. I dagens cyberlandskap har nasjonal sikkerhet i stor grad blitt ...
    • Threat Modeling in Satellite Communications for Maritime Operations 

      Frøseth, Even Kvam (Master thesis, 2024)
      Den nye romalderen og fremveksten av høy båndbredde Low Earth Orbit (LEO) satellittkonstellasjoner har forårsaket en raks endring i trussel landskapet for cybertrusler i industrier som er avhengige av satellittkommunikasjon. ...
    • Threat Modeling of a Smart Grid Secondary Substation 

      Holik, Filip; Flå, Lars; JAATUN, Martin Gilje; Yildirim Yayilgan, Sule; Foros, Jørn (Peer reviewed; Journal article, 2022)
      A full smart grid implementation requires the digitization of all parts of the smart grid infrastructure, including secondary electrical substations. Unfortunately, this introduces new security threats, which were not ...
    • Threat Modelling of Cyber-Physical Systems Using an Applied Pi-Calculus 

      Nweke, Livinus Obiora; Weldehawaryat, Goitom Kahsay; Wolthusen, Stephen Dirk Bjørn (Peer reviewed; Journal article, 2021)
      Cyber–Physical Systems (CPS) are distributed systems in which the state of the physical system is generally not observable in non-trivial cases, and where state transitions of this physical system can also occur without ...
    • TICK-stack 

      Lund-Lange, Adrian; Moen, Vetle Tangen (Bachelor thesis, 2019)
      Basefarm AS vil bruke monitoreringssystemet TICK i høyere grad enn det de allerede gjør, og ønsker derfor en vurdering av TICK-stakken i sin helhet. Prosjektgruppen har fått i oppgave å utrede ytelse og sikkerhet ved ...
    • Time synchronization across multiple devices in network nodes 

      Khosla, Raghav (Master thesis, 2017)
      Effective time synchronization has become a critical issue nowadays, especially where loads of confidential data needs to be transferred via a medium from one point to another. Rapid advancements in technology have paved ...
    • Time-variable scene quality perception tests 

      Berge, Håvard (Master thesis, 2009)
      Plan and carry out perception tests of time-varying scene composition, spatial and temporal resolution of scene objects, respectively, as defined in DMP. Base the time-variation on short time intervals of only tenths of ...
    • Timeframe-based contiguous file carving in video surveillance systems 

      Magnussen-Vik, Jostein (Master thesis, 2023)
      I straffesaker er ofte overvåkingsfilm en viktig del av bevisbildet. Det er viktig å få innhentet opptakene så tidlig som mulig på grunn av krav om sletting og lagringsplass på overvåkingssystemene. På grunn av personvernregler ...
    • Timestamp prefix carving for filesystem metadata extraction 

      Porter, Kyle; Nordvik, Rune; Toolan, Fergus; Axelsson, Stefan (Peer reviewed; Journal article, 2021)
      While file carving is a popular and effective method for extracting file content from unallocated space in a forensic image, it can be time consuming to carve for the wide variety of possible file signatures. Furthermore, ...
    • Timesynchronization in NATO Narrowband Waveform (NBWF) 

      Josten, Pål (Master thesis, 2013)
      A common notion of time is essential to avoid collisions in distributed radio networks using TDMA. Local clocks with limited accuracy are normally used to control time in each individual node. These clocks require regular ...
    • Timing Attacks on Machine Learning: State of the Art 

      Kianpour, Mazaher; Wen, Shao-Fang (Peer reviewed; Journal article, 2020)
      Machine learning plays a significant role in today’s business sectors and governments, in which it is becoming more utilized as tools to help in decision making and automation process. However, these tools are not inherently ...
    • Tool induced biases in iOS pattern of life analysis 

      Andersen, Daniel Bing (Master thesis, 2023)
      Mobile enheter og smartklokker lagrer stadig mer informasjon om brukerens aktiviteter. Dette kan inkludere detaljer rundt stedstjenester, tilkoblinger, helsedata og enhetsbruk. Analysen av slike bruksdata har fått betegnelsen ...
    • Tool-chain development for end-user composite services 

      Mbaabu, Frank (Master thesis, 2011)
      Telephony has become an integral part in the day to day communication and new telephony services are quickly being deployed in the industry. There is a need for users to be provided with new services on the fly; these ...
    • Tools for Organizing an Effective Virtual Academic Conference 

      Oruc, Aybars (Peer reviewed; Journal article, 2022)
      Academic conferences are an indispensable component of contemporary science, giving researchers the opportunity to present the results of recent investigations, become familiar with other scholars' studies, and build and ...
    • Top-down and bottom-up approaches to video quality of experience studies; overview and proposal of a new model 

      Koniuch, Kamil; barakovic, Sabina; Baraković Husić, Jasmina; Subramanian, Sruti; De Moor, Katrien Rachel W; Janowski, Lucjan; Wierzchoń, Michał (Journal article; Peer reviewed, 2024)
      Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield user ...
    • Topic: An investigation of large scale challenges with live video streaming over Wi-Fi access networks 

      Kanani, Sepideh (Master thesis, 2014)
      Due to growing demand for wireless access technology (802.11 standards), high capacity multimedia transmission over wireless pose a challenge, by taking note that video streaming has gained enormous popularityand is ...
    • Topology in WebRTC Services 

      Husøy, Tarjei Klinge (Master thesis, 2015)
      Bandwidth efficient, low latency, cheap - pick two. This has been the traditional trade-off for video conferencing providers, where the network topology has limited achievable performance in many conversation types. Consumers ...
    • Toward AI-Based Scenario Management for Cyber Range Training 

      Hannay, Jo Erskine; Stolpe, Audun; Yamin, Muhammad Mudassar (Chapter, 2021)
      There is an immediate need for a greater number of highly skilled cybersecurity personnel to meet intensified cyber attacks. We propose a cyber range exercise management architecture that employs machine reasoning to ...