Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 2526-2545 av 2594
-
Value of Investing in Information Security: A metastudy initiated by norSIS
(Master thesis, 2007)The ratio of companies and organizations in Norway with a number of employees between 5 and 9 and Internet access increased from 66% to 86% during a five year period from 2001 to 2006. This increased use of the Internet ... -
Variantbegrensning av IKT-systemer i Forsvaret – krefter og motkrefter
(Master thesis, 2023)Forsvaret har fått kraftig kritikk på flere områder innenfor informasjons- og kommunikasjonsteknologi (IKT), blant annet for manglende måloppnåelse når det gjelder å redusere antall IKT-systemer og øke evnen til samhandling. ... -
Variantbegrensning av IKT-systemer i Forsvaret – krefter og motkrefter
(Master thesis, 2023)Forsvaret har fått kraftig kritikk på flere områder innenfor informasjons- og kommunikasjonsteknologi (IKT), blant annet for manglende måloppnåelse når det gjelder å redusere antall IKT-systemer og øke evnen til samhandling. ... -
Variational Approach for Capsule Video Frame Interpolation
(Journal article; Peer reviewed, 2018)Capsule video endoscopy, which uses a wireless camera to visualize the digestive tract, is emerging as an alternative to traditional colonoscopy. Colonoscopy is considered as the gold standard for visualizing the colon and ... -
Vascular Pattern Recognition: And its Application in Privacy-Preserving Biometric Online-Banking Systems
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;2/2012, Doctoral thesis, 2012-10-04)Authentication is a key building block in security systems and many applications to prevent access to information, services, assets or locations for non-authorized persons or processes. Common methods based on knowledge ... -
Vehicular Fog/Edge Computing to improve dependability and performance
(Master thesis, 2020)We have more and more objects connected to the network. These objects need local information increasingly. This means that cloud computing is not suitable in some applications. This is also due to the high latency that it ... -
Vein Pattern Recognition Using Chain Codes, Spatial Information and Skeleton Fusing
(Chapter; Peer reviewed, 2012)Vein patterns are a unique attribute of each individual and can therefore be used as a biometric characteristic. Exploiting the specific near infrared light absorption properties of blood, the vein capture procedure is ... -
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
(Journal article; Peer reviewed, 2023)Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia. Practical protocols usually rely on tested ... -
VerifyMed - Application of blockchain technology to improve trust in virtualized healthcare services
(Master thesis, 2020)Helsevesenet går mot økt bruk av digitale helsetjenester. Ved å bruke slike tjenester kan pasienter møte helsepersonell ved bruk av nettbaserte applikasjoner, for eksempel via digitale konsultasjoner på video eller chat. ... -
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept
(Chapter, 2020)Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to ... -
Verktøy for helhetlig risikostyring og informasjonssikkerhet: Bruk av Return on Security Investment for kost/nytte-analyse av investeringer i informasjonssikkerhet
(Master thesis, 2008)Investeringer i informasjonssikkerhet utgjør i dag en stor del av organisasjoners investeringer. På bakgrunn av dette er det økende etterspørsel etter kost/nytte-analyser for investeringer i informasjonssikkerhet. ... -
Video - based fall detection in elderly’s houses
(Master thesis, 2008)NORSK: Automatisk oppdagellse av en fallende person som blir basert påvideoanalyse er et viktig problem med anvendelse i sikkerhetsområder samt støttende hjemmiljøer og gamlehjem. Bruken av datavisjonssystemer byr en ... -
Video QoE Killer and Performance Statistics in WebRTC-based Video Communication
(Chapter, 2016)Abstract: In this paper, we investigate session-related performance statistics of a Web-based Real-Time Communication (WebRTC) application called appear.in. We explore the characteristics of these statistics and explore ... -
Videoconference Fatigue: A Conceptual Analysis
(Peer reviewed; Journal article, 2022)Videoconferencing (VC) is a type of online meeting that allows two or more participants from different locations to engage in live multi-directional audio-visual communication and collaboration (e.g., via screen sharing). ... -
Videokonsultasjoner i primærhelsetjenesten: opplevd kvalitet og brukeropplevelser
(Master thesis, 2021)Etter å ha sett en økning de siste årene, tok bruken av verktøy for videokonferanser av som følge av koronapandemien. Med den økende utviklingen av verktøy og tjenester for videokonferanser, blir behovet for å evaluere ... -
Virtual (floating) Context Sharing between Vehicles: Generating and Sharing Context Information within an Autonomous Network of Vehicles
(Master thesis, 2010)This thesis investigates some of the potential within Intelligent Transportation Systems and Inter-Vehicle Communication. The aim is to find a method for spreading information throughout an ad hoc network of vehicles with ... -
Virtual desktop and cloud services: new security demand
(Master thesis, 2012)Recently, the adoption of cloud services has led to several security concerns. Cloud services in most cases have benefits on reducing the cost and increasing the flexibility. Cloud adaption may cause several security ... -
Virtual Wires: Rethinking WiFi networks
(Chapter, 2019)WiFi is the dominant means for home Internet access, yet is frequently a performance bottleneck. Without reliable, satisfactory performance at the last hop, end-to-end quality of service (QoS) efforts will fail. Three major ... -
Virtualize A Piece Of Evidence Or Mount Its Partition With Linux
(Master thesis, 2019)Abstract In a computer forensic investigation, there is always a divergence between the time required to visualize data from evidence and the times when investigators need the data to evaluate it. On the one hand, the ... -
Vision-based robotic system for picking and inspection of small automotive components
(Journal article; Peer reviewed, 2016)The use of vision systems for industrial robot guidance and quality control becomes much harder when the manufactured products and their components are small and possess reflective surface. To assure an effective automated ...