Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 401-420 av 2626
-
A Call for Mandatory Input Validation and Fuzz Testing
(Journal article; Peer reviewed, 2023)The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and ... -
Camera based Display Image Quality Assessment
(Doctoral Dissertations at Gjøvik University College;3-2015, Doctoral thesis, 2015-11-04)This thesis presents the outcomes of research carried out by the PhD candidate Ping Zhao during 2012 to 2015 in Gjøvik University College. The underlying research was a part of the HyPerCept project, in the program of ... -
Campusguiden: En navigasjonstjeneste for innendørs bruk
(Master thesis, 2011)Oppgaven har kartlagt nytte og betalingsvilje for CampusGuiden ved to ulike marked. Til dette ble en kvalitativ forskningsmetode benyttet. Det har blitt laget en forretningsmodell, som blant annet beskriver aktører, kostnader ... -
CampusGuiden: Indoor Positioning, Data Analysis and Novel Insights
(Master thesis, 2013)A positioning system enables a mobile device to determine its position, and makes the position of the device available for position-based services such as navigation, tracking or monitoring. The fact that GPS satellite-based ... -
Can Blockchain Spark off the Reincarnation of India’s Living Dead?
(Chapter, 2018)A large number of studies have found a negative correlation between economic growth and corruption. Therefore, governments implement various anti-corruption measures particularly technology-based mechanisms. The government ... -
Can network security be fun? : an agent-based simulation model and game proposal
(Master thesis, 2006)NORSK: Altfor ofte lærer man om nettverk- og informasjonssikkerhet gjennom egne, dårlige, erfaringer, eller gjennom såkalt “learning by burning”. Dette kan være en kostbar affære. De fleste internettbrukere mangler ... -
Can no-reference image quality metrics assess visible wavelength iris sample quality?
(Journal article; Peer reviewed, 2017)The overall performance of iris recognition systems is affected by the quality of acquired iris sample images. Due to the development of imaging technologies, visible wavelength iris recognition gained a lot of attention ... -
Capacity of Mobile Ad Hoc Networks Using an Airborne Relay
(Master thesis, 2016)Self-organizing wireless networks is an interesting technology with a potential of providing robust communication in environments without existing infrastructure and a minimum of configuration. Such features seem especially ... -
Carrier Synchronization in OFDM without Use of Pilots
(Dr. ingeniøravhandling, 0809-103X; 2000:111, Doctoral thesis, 2000)Among new emerging digital communication systems, there is a clear trend of an increasing number of services using high capacity broad band connections, e.g. transfer of images, video and high quality sound. This makes it ... -
Case study analysis: Insider incidents at Volvo, Scania, Den Norske Veritas (DNV), the Swedish Security Service (SÄPO) and the Swedish Military Intelligence
(Master thesis, 2023)Denne oppgaven omhandler innsidetrusselen relatert til statlige aktører som rekrutterer mennesker, til innhenting av informasjon som ellers ikke hadde vært tilgjengelig. Denne angrepsvektoren er godt beskrevet og gjort ... -
A case study of a municipality phishing attack measures - towards a socio-technical incident management framework
(Peer reviewed; Journal article, 2021)During the Corona-crisis, the number of data breaches and hacking increased rapidly. For some organizations it was difficult to handle both the Corona-crises and such attacks. A decision made to prevent this overload of ... -
CCA Functional Structure & Architecture
(Research report, 2011) -
Centralizing security and operations of Windows clients in an emergency care IT infrastructure
(Bachelor thesis, 2021)HDO er i dag i en omstillingsprosess der de ønsker å anskaffe en ny kommunikasjonsløsning for det norske nødnettet. Som en del av deres nye løsning, vil HDO sende ut Windows klienter til lokasjoner knyttet til nødnettet, ... -
Certificatless authenticated two-party key : agreement protocol
(Master thesis, 2006)NORSK: Utfordringen i dag ved å utvikle sikre systemer basert på offentlig-nøkkel kryptografi er ikke det å velge tilstrekkelig sikre algoritmer og implementere disse, men heller å utvikle en infrastruktur som forsikrer ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects
(Journal article; Peer reviewed, 2018)The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for ... -
Challenges in IT Security Preparedness Exercises: A Case Study
(Journal article; Peer reviewed, 2016)The electric power industry is currently implementing major technological changes in order to achieve the goal of smart grids. However, these changes are expected to increase the susceptibility of the industry to IT security ... -
Challenges of Anonymous Communication: Bridging Gaps between Theory and Practice
(Doktoravhandlinger ved NTNU, 1503-8181; 2012:19, Doctoral thesis, 2012)Anonymous communication is an important building block for privacy enhancing technologies and in addition to this, the deployed anonymity networks have become important tools to protect the users’ privacy in the Internet ... -
Character-based Writer Verification of Ancient Hebrew Square-script Manuscripts: On Edge-direction Feature
(Journal article, 2023)Handwriting significantly contributes to the task of the writer identification and verification of modern and historical documents. This work developed a writer verification system for ancient Hebrew square-script manuscripts, ...