Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2427-2446 av 2542
-
User-Perceived Quality of Service in Video on Demand Services
(Master thesis, 2006)Video on Demand (VoD) is an Internet service with a growing appeal to the mass market, and is of increasing importance to Internet service providers' revenue. This master's thesis presents a subjective assessment on the ... -
Users on the Move: On Relationships Between QoE Ratings, Data Volumes and Intentions to Churn
(Chapter, 2017)For a long time, the risk of customer churn, i.e. to leave an operator, has been used as argument in favor of Quality or Experience (QoE) research. However, the understanding of how churn behavior and QoE are related is ... -
User’s trust in Biometric Authentication Systems – Do not take the end-users for granted
(Master thesis, 2005)NORSK: I de senere årene har mediefokuset vært rettet mot sikkerhet. Et av kravene innenfor sikkerhet, er økt behov for korrekt autentisering av en person. Det er mulig å autentisere seg ved å fremlegge bevis på noe du ... -
Using 5G QoS Mechanisms to Achieve QoE-Aware Resource Allocation
(Chapter, 2021)Network operators generally aim at providing a good level of satisfaction to their customers. Diverse application demands require the usage of beyond best-effort resource allocation mechanisms, particularly in resource-constrained ... -
Using a machine learning approach for URL analysis
(Master thesis, 2023)Den raske veksten av Internett-baserte aktiviteter har ført til en betydelig økning i cybertrusler, med villedende og ondsinnede URL-er som fungerer som et nøkkelverktøy for å spre skadelig programvare, utføre phishing-angrep ... -
Using a socio-technical systems approach to design and support systems thinking in cyber security education
(Journal article; Peer reviewed, 2018)Information security (IS) has been categorized as protecting the confidentiality, integrity, availability, authentication and accountability of information. There is a gap between what companies and institutions plan to ... -
Using Author Profiling to Determine the Age Group of an Author
(Master thesis, 2019)Denne masteroppgaven utforsker hvordan fastslå aldersgruppen til en forfatter. I hovedsak om forfatteren er et barn, som vil si under 18 år, eller voksen, 25 år og oppover. Videre er målet å undersøke hvilke tekstlige trekk ... -
Using benchmarking to improve IDS configurations
(Master thesis, 2004)NORSK: Benchmarking av Intrusion Detection Systems (IDS) kan være en viktig metode for å finne ut om IDSen fungerer som den skal. Da IDS fungerer som en vaktbikkje mot angrep, skadelig programvare eller andre potensielle ... -
Using Bi-directional Data Diodes to Limit Propagation of Network Attacks
(Master thesis, 2019)De fleste nettverk er sårbare for angrep på flere forskjellige enheter. Etter at en angriper har klart å få tilgang til en enhet på nettverket kan han bruke den til å angripe andre enheter koblet til det samme nettverket. ... -
Using Blockchains to strengthen the security of Internet of Things
(Chapter, 2018)Blockchain is a distributed ledger technology that became popular as the foundational block of the Bitcoin cryptocurrency. Over the past few years it has seen a rapid growth, both in terms of research and commercial usage. ... -
Using Case-based Reasoning for Privacy Decisions
(Master thesis, 2012)SINTEF ICT has developed a prototype Privacy Enhancing Technology calledPrivacy Advisor that uses Case-based Reasoning to give advice to users on ifthey should accept or reject the privacy policies of a service provider ... -
Using Coloured Petri Nets in Penetration Testing
(Master thesis, 2005)NORSK: Nettverkspenetrasjonstesting er en velkjent metode brukt innen sikkerhetstesting. Penetrasjonstesting kan være en omfattende oppgave som krever mye kunnskap og ekspertise, med mange forskjellige teknikker, og et ... -
Using Commodity Coprocessors for Host Intrusion Detection
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2012, Doctoral thesis, 2012-08-17)The ever-rising importance of communication services and devices emphasizes the significance of intrusion detection. Besides general network attacks, private hosts in particular are within the focus of cyber criminals. ... -
Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation
(Chapter, 2019)Abstract: Human behavior plays a significant role within the domain of information security. The Conflicting Incentives Risk Analysis (CIRA) method focuses on stakeholder motivation to analyze risks resulting from the ... -
Using Financial Instruments to Transfer the Information Security Risks
(Journal article; Peer reviewed, 2016)For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem ... -
Using Formal Methods for Modelling Cyber-Physical Systems Security
(Doctoral theses at NTNU;2022:169, Doctoral thesis, 2022)The recent years have witnessed an increasing integration of physical systems with information and communication technology (ICT). This emerging field is usually referred to as cyber-physical systems (CPS) and has generated ... -
Using gaze information to improve image difference metrics
(Proceedings of SPIE;6806, Journal article; Peer reviewed, 2008)We have used image difference metrics to measure the quality of a set of images to know how well they predict perceived image difference. We carried out a psychophysical experiment with 25 observers along with a recording ... -
Using genetic algorithms to improve the reliability of dual homed wireless critical services
(Chapter, 2014)The wireless access to any service in different contexts is nowadays taken for granted. However, the dependability requirements are different for various services and contexts. Critical services put high requirement on the ... -
Using GSM SIM Authentication in VPNs
(Master thesis, 2007)With the growth of the Internet a lot of different services has emerged. These services are often accompanied by some kind of security system. Since most of these services are stand-alone systems, a whole range of different ... -
Using hash values to identify fragments of evidence. Taking the concept of known file hash databases a step further.
(Master thesis, 2004)NORSK: Siden flere utnytter datautstyr til å begå kriminelle handlinger og lagringskapasiteten på slikt utstyr øker, fører dette til en eksplosiv økning i den datamengden som må gjennomgåes for å finne tekniske bevis. Det ...