Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2433-2452 av 2527
-
Using hash values to identify fragments of evidence. Taking the concept of known file hash databases a step further.
(Master thesis, 2004)NORSK: Siden flere utnytter datautstyr til å begå kriminelle handlinger og lagringskapasiteten på slikt utstyr øker, fører dette til en eksplosiv økning i den datamengden som må gjennomgåes for å finne tekniske bevis. Det ... -
Using Hidden Markov Models for Biometric Gait Recognition
(Master thesis, 2010)The need for secure authentication to mobile devices is rapidly increasing with the advent of new technologies. Many of the new mobile devices can be used for various purposes such as internet access, mobile banking, ... -
Using Honeypots to Analyze Bots and Botnets
(Master thesis, 2007)In this Master thesis we will perform honeypot experiments where we allow malicious users access to systems and analyze their behaviour. Our focus will be on botnets, and how attackers progress to infect systems and add ... -
Using informed access network selection to improve HTTP adaptive streaming performance
(Chapter, 2020)As end-user devices often have multiple access networks available, choosing the most suitable network can help to improve application performance and user experience. However, selecting the best access network for HTTP ... -
Using machine learning for optimal SLA/SLO contract negotiation in 5G
(Master thesis, 2020)The objective of this master thesis is to optimize strategy in the multi-operator domain to achieve the lowest overall cost while meeting the dependability SLO by using machine learning. To reach this objective, we ... -
Using machine learning to detect cyber and physical attacks in mobile robots
(Master thesis, 2023)Ettersom bruken av roboter øker i industrien for å løse ulike utfordringer, øker også behovet for å sikre disse løsningene. Dette gjelder spesielt for mobile roboter, hvor angrep fra en ondsinnet aktør potensielt kan ha ... -
Using metrics to assess the ICC perceptual rendering intent
(Proceedings of SPIE;7867, Journal article; Peer reviewed, 2011)Increased interest in color management has resulted in more options for the user to choose between for their color management needs. We propose an evaluation process that uses metrics to assess the quality of ICC profiles, ... -
Using NetFlow analysis to detect worm propagation
(Master thesis, 2010)ENGELSK: The Internet has become the main network for commerce, recreation and communication and this has increased the need to protect sensitive information. Computer worms will continue to pose a major threat to us, ... -
Using Netflows for slow portscan detection
(Master thesis, 2005)NORSK: Organisasjoner som har en definert sikkerhetsstrategi har ofte implementert systemer for inntrengningsdeteksjon. Slike løsninger fokuserer som regel på sann-tids analyse av sikkerhetstruende hendelser i ... -
Using Neural Networks for IoT Power Management
(Master thesis, 2020)De fleste enheter i Tingenes Internett (IoT) har begrenset batterilevetid. For å likevel kunne være pålitelige er de nødt til å utnytte batteriet på en så optimal måte som mulig. Dette prosjektet ser på hvorvidt nevrale ... -
Using NTFS cluster allocation behavior to find the location of user data
(Journal article; Peer reviewed, 2019)Digital forensics is heavily affected by the large and increasing amount of data to be processed. To solve the problem there is ongoing research to find more efficient carving algorithms, use parallel processing in the ... -
Using Perceptual Hash Algorithms to Identify Fragmented and Transformed Video Files
(Master thesis, 2014)ENGLISH: Over the last decades the amount of generated video content has increased exponentially. Easy access to video recording equipment and the Internet has given anyone the ability to create and share video material ... -
Using SIM for strong end-to-end Application Authentication
(Master thesis, 2006)Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both ... -
Using SIM for strong end-to-end Application Authentication
(Master thesis, 2006)Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both ... -
Using Social Media as Evidence in Criminal Investigations
(Master thesis, 2023)Bruken av sosiale medier har vokst eksponentielt gjennom årene, så vel som mengden kriminalitet som utføres på sosiale medieplattformer. Med denne veksten følger utfordringer med å bruke data fra sosiale medier i etterforskning ... -
Using the human gait for authentication
(Master thesis, 2005)NORSK: Denne rapporten presenterer en ny metode for å verifisere en persons identitet ved hjelp av kinetisk ganglagsanalyse. Ganglagsdata samles inn ved å bruke en innretning festet til personens bein, hvor den registrerer ... -
Using the object ID index as an investigative approach for NTFS file systems
(Journal article; Peer reviewed, 2019)When investigating an incident it is important to document user activity, and to document which storage device was connected to which computer. We present a new approach to documenting user activity in computer systems ... -
Using the triangle inequality to speed-up anomaly detection systems based on the k-means clustering
(Master thesis, 2022)Det finnes en mange teknikker og algoritmer som kan brukes for å forbedre et inntrengningsdeteksjonssystem. Innenfor algoritmer for inntrengningsdeteksjonssystemer er maskinlæring en ønskelig metode da den kan redusere ... -
Using Theories from Economics and Finance for Information Security Risk Management
(Doctoral theses at NTNU;2016:187, Doctoral thesis, 2016)Risk management in information security has traditionally been approached from a technical perspective, and a variety of technical controls are deployed to prevent any future information security event. However, recent ... -
Utarbeide masterplan for transportnett-utbygging i Finnmark fylke
(Master thesis, 2007)Finnmark Fylke har i dag, som eneste fylke i Norge, et transportnett som i all hovedsak bæres av radiolinjeforbindelser. Disse er imidlertid på vei til å møte sine kapasitetsbegrensninger. Gitt det faktum at radiolinjefo ...