• Using Case-based Reasoning for Privacy Decisions 

      Børseth, Daniel Jørgen (Master thesis, 2012)
      SINTEF ICT has developed a prototype Privacy Enhancing Technology calledPrivacy Advisor that uses Case-based Reasoning to give advice to users on ifthey should accept or reject the privacy policies of a service provider ...
    • Using Coloured Petri Nets in Penetration Testing 

      Dahl, Ole Martin (Master thesis, 2005)
      NORSK: Nettverkspenetrasjonstesting er en velkjent metode brukt innen sikkerhetstesting. Penetrasjonstesting kan være en omfattende oppgave som krever mye kunnskap og ekspertise, med mange forskjellige teknikker, og et ...
    • Using Commodity Coprocessors for Host Intrusion Detection 

      Seger, Mark M. (Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2012, Doctoral thesis, 2012-08-17)
      The ever-rising importance of communication services and devices emphasizes the significance of intrusion detection. Besides general network attacks, private hosts in particular are within the focus of cyber criminals. ...
    • Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation 

      Szekeres, Adam; Wasnik, Pankaj Shivdayal; Snekkenes, Einar Arthur (Chapter, 2019)
      Abstract: Human behavior plays a significant role within the domain of information security. The Conflicting Incentives Risk Analysis (CIRA) method focuses on stakeholder motivation to analyze risks resulting from the ...
    • Using Financial Instruments to Transfer the Information Security Risks 

      Pandey, Pankaj; Snekkenes, Einar (Journal article; Peer reviewed, 2016)
      For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem ...
    • Using Formal Methods for Modelling Cyber-Physical Systems Security 

      Nweke, Livinus Obiora (Doctoral theses at NTNU;2022:169, Doctoral thesis, 2022)
      The recent years have witnessed an increasing integration of physical systems with information and communication technology (ICT). This emerging field is usually referred to as cyber-physical systems (CPS) and has generated ...
    • Using gaze information to improve image difference metrics 

      Pedersen, Marius; Hardeberg, Jon Yngve; Nussbaum, Peter (Proceedings of SPIE;6806, Journal article; Peer reviewed, 2008)
      We have used image difference metrics to measure the quality of a set of images to know how well they predict perceived image difference. We carried out a psychophysical experiment with 25 observers along with a recording ...
    • Using genetic algorithms to improve the reliability of dual homed wireless critical services 

      Følstad, Eirik Larsen; Helvik, Bjarne Emil (Chapter, 2014)
      The wireless access to any service in different contexts is nowadays taken for granted. However, the dependability requirements are different for various services and contexts. Critical services put high requirement on the ...
    • Using GSM SIM Authentication in VPNs 

      Bjørnstad, Torstein (Master thesis, 2007)
      With the growth of the Internet a lot of different services has emerged. These services are often accompanied by some kind of security system. Since most of these services are stand-alone systems, a whole range of different ...
    • Using hash values to identify fragments of evidence. Taking the concept of known file hash databases a step further. 

      Kintel, Ketil (Master thesis, 2004)
      NORSK: Siden flere utnytter datautstyr til å begå kriminelle handlinger og lagringskapasiteten på slikt utstyr øker, fører dette til en eksplosiv økning i den datamengden som må gjennomgåes for å finne tekniske bevis. Det ...
    • Using Hidden Markov Models for Biometric Gait Recognition 

      Rangarajan, Sathyanarayanan (Master thesis, 2010)
      The need for secure authentication to mobile devices is rapidly increasing with the advent of new technologies. Many of the new mobile devices can be used for various purposes such as internet access, mobile banking, ...
    • Using Honeypots to Analyze Bots and Botnets 

      Bergande, Eirik Falk Georg; Smedsrud, Jon Fjeldberg (Master thesis, 2007)
      In this Master thesis we will perform honeypot experiments where we allow malicious users access to systems and analyze their behaviour. Our focus will be on botnets, and how attackers progress to infect systems and add ...
    • Using informed access network selection to improve HTTP adaptive streaming performance 

      Enghardt, Theresa; Zinner, Thomas; Feldmann, Anja (Chapter, 2020)
      As end-user devices often have multiple access networks available, choosing the most suitable network can help to improve application performance and user experience. However, selecting the best access network for HTTP ...
    • Using machine learning for optimal SLA/SLO contract negotiation in 5G 

      Zhu Zhu (Master thesis, 2020)
      The objective of this master thesis is to optimize strategy in the multi-operator domain to achieve the lowest overall cost while meeting the dependability SLO by using machine learning. To reach this objective, we ...
    • Using machine learning to detect cyber and physical attacks in mobile robots 

      Nyusti, Levente (Master thesis, 2023)
      Ettersom bruken av roboter øker i industrien for å løse ulike utfordringer, øker også behovet for å sikre disse løsningene. Dette gjelder spesielt for mobile roboter, hvor angrep fra en ondsinnet aktør potensielt kan ha ...
    • Using metrics to assess the ICC perceptual rendering intent 

      Falkenstern, Kristin; Bonnier, Nicolas; Pedersen, Marius; Brettel, Hans; Vienot, Francoise (Proceedings of SPIE;7867, Journal article; Peer reviewed, 2011)
      Increased interest in color management has resulted in more options for the user to choose between for their color management needs. We propose an evaluation process that uses metrics to assess the quality of ICC profiles, ...
    • Using NetFlow analysis to detect worm propagation 

      Fossbakk, Kjell Tore (Master thesis, 2010)
      ENGELSK: The Internet has become the main network for commerce, recreation and communication and this has increased the need to protect sensitive information. Computer worms will continue to pose a major threat to us, ...
    • Using Netflows for slow portscan detection 

      Malmedal, Bjarte (Master thesis, 2005)
      NORSK: Organisasjoner som har en definert sikkerhetsstrategi har ofte implementert systemer for inntrengningsdeteksjon. Slike løsninger fokuserer som regel på sann-tids analyse av sikkerhetstruende hendelser i ...
    • Using Neural Networks for IoT Power Management 

      Stephansen-Smith, Finn Julius (Master thesis, 2020)
      De fleste enheter i Tingenes Internett (IoT) har begrenset batterilevetid. For å likevel kunne være pålitelige er de nødt til å utnytte batteriet på en så optimal måte som mulig. Dette prosjektet ser på hvorvidt nevrale ...
    • Using NTFS cluster allocation behavior to find the location of user data 

      Karresand, Nils Martin Mikael; Axelsson, Stefan; Dyrkolbotn, Geir Olav (Journal article; Peer reviewed, 2019)
      Digital forensics is heavily affected by the large and increasing amount of data to be processed. To solve the problem there is ongoing research to find more efficient carving algorithms, use parallel processing in the ...