• User-Perceived Quality of Service in Video on Demand Services 

      Flo, Arnfinn (Master thesis, 2006)
      Video on Demand (VoD) is an Internet service with a growing appeal to the mass market, and is of increasing importance to Internet service providers' revenue. This master's thesis presents a subjective assessment on the ...
    • Users on the Move: On Relationships Between QoE Ratings, Data Volumes and Intentions to Churn 

      Fiedler, Markus; De Moor, Katrien; Ravuri, Hemanth; Tanneedi, Prithvi; Chandiri, Mounika (Chapter, 2017)
      For a long time, the risk of customer churn, i.e. to leave an operator, has been used as argument in favor of Quality or Experience (QoE) research. However, the understanding of how churn behavior and QoE are related is ...
    • User’s trust in Biometric Authentication Systems – Do not take the end-users for granted 

      Gravnås, Henning (Master thesis, 2005)
      NORSK: I de senere årene har mediefokuset vært rettet mot sikkerhet. Et av kravene innenfor sikkerhet, er økt behov for korrekt autentisering av en person. Det er mulig å autentisere seg ved å fremlegge bevis på noe du ...
    • Using 5G QoS Mechanisms to Achieve QoE-Aware Resource Allocation 

      Bosk, Marcin; Gajic, Marija; Schwarzmann, Susanna; Lange, Stanislav; Trivisonno, Riccardo; Marquezan, Clarissa; Zinner, Thomas Erich (Chapter, 2021)
      Network operators generally aim at providing a good level of satisfaction to their customers. Diverse application demands require the usage of beyond best-effort resource allocation mechanisms, particularly in resource-constrained ...
    • Using a machine learning approach for URL analysis 

      Marjara, Avleen Singh (Master thesis, 2023)
      Den raske veksten av Internett-baserte aktiviteter har ført til en betydelig økning i cybertrusler, med villedende og ondsinnede URL-er som fungerer som et nøkkelverktøy for å spre skadelig programvare, utføre phishing-angrep ...
    • Using a socio-technical systems approach to design and support systems thinking in cyber security education 

      Zoto, Erjon; Kowalski, Stewart James; Lopez Rojas, Edgar Alonso; Kianpour, Mazaher (Journal article; Peer reviewed, 2018)
      Information security (IS) has been categorized as protecting the confidentiality, integrity, availability, authentication and accountability of information. There is a gap between what companies and institutions plan to ...
    • Using Author Profiling to Determine the Age Group of an Author 

      Holbæk, Eirik (Master thesis, 2019)
      Denne masteroppgaven utforsker hvordan fastslå aldersgruppen til en forfatter. I hovedsak om forfatteren er et barn, som vil si under 18 år, eller voksen, 25 år og oppover. Videre er målet å undersøke hvilke tekstlige trekk ...
    • Using benchmarking to improve IDS configurations 

      Tvenge, Morten (Master thesis, 2004)
      NORSK: Benchmarking av Intrusion Detection Systems (IDS) kan være en viktig metode for å finne ut om IDSen fungerer som den skal. Da IDS fungerer som en vaktbikkje mot angrep, skadelig programvare eller andre potensielle ...
    • Using Bi-directional Data Diodes to Limit Propagation of Network Attacks 

      Aasen, Øyvind (Master thesis, 2019)
      De fleste nettverk er sårbare for angrep på flere forskjellige enheter. Etter at en angriper har klart å få tilgang til en enhet på nettverket kan han bruke den til å angripe andre enheter koblet til det samme nettverket. ...
    • Using Blockchains to strengthen the security of Internet of Things 

      Kouzinopoulos, Charalampos S.; Spathoulas, Georgios; Giannoutakis, Konstantinos M.; Votis, Konstantinos; Pandey, Pankaj; Tzovaras, Dimitrios; Katsikas, Sokratis; Collen, Anastasija; Nijdam, Niels Alexander (Chapter, 2018)
      Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. ...
    • Using Case-based Reasoning for Privacy Decisions 

      Børseth, Daniel Jørgen (Master thesis, 2012)
      SINTEF ICT has developed a prototype Privacy Enhancing Technology calledPrivacy Advisor that uses Case-based Reasoning to give advice to users on ifthey should accept or reject the privacy policies of a service provider ...
    • Using Coloured Petri Nets in Penetration Testing 

      Dahl, Ole Martin (Master thesis, 2005)
      NORSK: Nettverkspenetrasjonstesting er en velkjent metode brukt innen sikkerhetstesting. Penetrasjonstesting kan være en omfattende oppgave som krever mye kunnskap og ekspertise, med mange forskjellige teknikker, og et ...
    • Using Commodity Coprocessors for Host Intrusion Detection 

      Seger, Mark M. (Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2012, Doctoral thesis, 2012-08-17)
      The ever-rising importance of communication services and devices emphasizes the significance of intrusion detection. Besides general network attacks, private hosts in particular are within the focus of cyber criminals. ...
    • Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation 

      Szekeres, Adam; Wasnik, Pankaj Shivdayal; Snekkenes, Einar Arthur (Chapter, 2019)
      Abstract: Human behavior plays a significant role within the domain of information security. The Conflicting Incentives Risk Analysis (CIRA) method focuses on stakeholder motivation to analyze risks resulting from the ...
    • Using Financial Instruments to Transfer the Information Security Risks 

      Pandey, Pankaj; Snekkenes, Einar (Journal article; Peer reviewed, 2016)
      For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem ...
    • Using Formal Methods for Modelling Cyber-Physical Systems Security 

      Nweke, Livinus Obiora (Doctoral theses at NTNU;2022:169, Doctoral thesis, 2022)
      The recent years have witnessed an increasing integration of physical systems with information and communication technology (ICT). This emerging field is usually referred to as cyber-physical systems (CPS) and has generated ...
    • Using gaze information to improve image difference metrics 

      Pedersen, Marius; Hardeberg, Jon Yngve; Nussbaum, Peter (Proceedings of SPIE;6806, Journal article; Peer reviewed, 2008)
      We have used image difference metrics to measure the quality of a set of images to know how well they predict perceived image difference. We carried out a psychophysical experiment with 25 observers along with a recording ...
    • Using genetic algorithms to improve the reliability of dual homed wireless critical services 

      Følstad, Eirik Larsen; Helvik, Bjarne Emil (Chapter, 2014)
      The wireless access to any service in different contexts is nowadays taken for granted. However, the dependability requirements are different for various services and contexts. Critical services put high requirement on the ...
    • Using GSM SIM Authentication in VPNs 

      Bjørnstad, Torstein (Master thesis, 2007)
      With the growth of the Internet a lot of different services has emerged. These services are often accompanied by some kind of security system. Since most of these services are stand-alone systems, a whole range of different ...
    • Using hash values to identify fragments of evidence. Taking the concept of known file hash databases a step further. 

      Kintel, Ketil (Master thesis, 2004)
      NORSK: Siden flere utnytter datautstyr til å begå kriminelle handlinger og lagringskapasiteten på slikt utstyr øker, fører dette til en eksplosiv økning i den datamengden som må gjennomgåes for å finne tekniske bevis. Det ...