Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 2387-2406 of 2628
-
Timesynchronization in NATO Narrowband Waveform (NBWF)
(Master thesis, 2013)A common notion of time is essential to avoid collisions in distributed radio networks using TDMA. Local clocks with limited accuracy are normally used to control time in each individual node. These clocks require regular ... -
Timing Attacks on Machine Learning: State of the Art
(Peer reviewed; Journal article, 2020)Machine learning plays a significant role in today’s business sectors and governments, in which it is becoming more utilized as tools to help in decision making and automation process. However, these tools are not inherently ... -
Tool induced biases in iOS pattern of life analysis
(Master thesis, 2023)Mobile enheter og smartklokker lagrer stadig mer informasjon om brukerens aktiviteter. Dette kan inkludere detaljer rundt stedstjenester, tilkoblinger, helsedata og enhetsbruk. Analysen av slike bruksdata har fått betegnelsen ... -
Tool-chain development for end-user composite services
(Master thesis, 2011)Telephony has become an integral part in the day to day communication and new telephony services are quickly being deployed in the industry. There is a need for users to be provided with new services on the fly; these ... -
Tools for Organizing an Effective Virtual Academic Conference
(Peer reviewed; Journal article, 2022)Academic conferences are an indispensable component of contemporary science, giving researchers the opportunity to present the results of recent investigations, become familiar with other scholars' studies, and build and ... -
Top-down and bottom-up approaches to video quality of experience studies; overview and proposal of a new model
(Journal article; Peer reviewed, 2024)Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield user ... -
Topic: An investigation of large scale challenges with live video streaming over Wi-Fi access networks
(Master thesis, 2014)Due to growing demand for wireless access technology (802.11 standards), high capacity multimedia transmission over wireless pose a challenge, by taking note that video streaming has gained enormous popularityand is ... -
Topology in WebRTC Services
(Master thesis, 2015)Bandwidth efficient, low latency, cheap - pick two. This has been the traditional trade-off for video conferencing providers, where the network topology has limited achievable performance in many conversation types. Consumers ... -
Toward AI-Based Scenario Management for Cyber Range Training
(Chapter, 2021)There is an immediate need for a greater number of highly skilled cybersecurity personnel to meet intensified cyber attacks. We propose a cyber range exercise management architecture that employs machine reasoning to ... -
Toward Smart Public Interconnected Networks and Services — Approaching the Stumbling Blocks
(Journal article; Peer reviewed, 2023)The visions of 5G and Beyond (B5G) imply unprecedented expectations toward high-performing connectivity services in both public and private networks. Connectivity services that offer performance guarantees along multiple ... -
Towards 5G network slice isolation with WireGuard and Open Source MANO
(Master thesis, 2020)Å støtte vertikale industri segmenter og tjeneste-utvikling har vært en prioritet under utviklingen av 5G mobilnettet. Ved hjelp av nye business modeller og teknologier som Virtuelle Nettverksfunksjoner og Programvaredefinerte ... -
Towards a Biometric Random Number Generator - A General Approach For True Random Extraction From Biometric Samples
(Chapter; Peer reviewed, 2011) -
Towards a compliant and secure cloud: cloud migration, swapping providers and contractual aspects
(Master thesis, 2012)ENGELSK: One of the issues in the cloud today is the switching between different service providers. Cloud providers often deliver their services through specific platforms(API), with specific tools, customized and special ... -
Towards a Context-Based Approach for Software Security Learning
(Journal article; Peer reviewed, 2019)Learning software security is one of the most challenging tasks in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding its practical applications. Conventional ... -
Towards a Cyber-Physical Range for the Integrated Navigation System
(Peer reviewed; Journal article, 2022)The e-navigation concept was introduced by the IMO to enhance berth-to-berth navigation towards enhancing environmental protection, and safety and security at sea by leveraging technological advancements. Even though a ... -
Towards a Generic Approach of Quantifying Evidence Volatility in Resource Constrained Devices
(Chapter, 2021)Forensic investigations of the Internet of Things (IoT) is often assumed to be a combination of existing cloud, network, and device forensics. Resource constraints in many of the peripheral things, however, are affecting ... -
Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
(Peer reviewed; Journal article, 2020)In this paper we present ongoing research into escalation maturity measurements of organizations. We outline how to integrate a socio-technical approach and LIFT-methodology to improve the escalation maturity improvement ... -
Towards a Methodology to Assess Quality of 5G Slicing
(Master thesis, 2023)Skivedeling av nettverk muliggjøre at flere tjenester og applikasjoner med ulike ytelseskrav kan operere parallelt på en delt nettverksinfrastruktur. Ved å benytte programvaredefinert nettverk (SDN) og nettverksfunksjons ... -
Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications
(Peer reviewed; Journal article, 2022)In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems became the major concern for researchers and health organizations. With time, the sophistication of these attacks is ... -
Towards a Quantitative Approach for Security Assurance Metrics
(Chapter, 2018)The need for effective and efficient evaluation schemes of security assurance is growing in many organizations, especially Small and Medium Enterprises (SMEs). Although there are several approaches and standards for ...