• Design of Backbone for Wireless Citywide Networks like Wireless Trondheim 

      Torstensen, Asgeir (Master thesis, 2006)
      This master's thesis will investigate some of the technological solutions available for the construction of a backbone for a wireless citywide network (CWN), such as Wireless Trondheim, and a special attention is given ...
    • Design of Backbone for Wireless Citywide Networks like Wireless Trondheim 

      Torstensen, Asgeir (Master thesis, 2006)
      This master's thesis will investigate some of the technological solutions available for the construction of a backbone for a wireless citywide network (CWN), such as Wireless Trondheim, and a special attention is given ...
    • Design of Novel Energy-Efficient and Privacy-Preserving Blockchain Consensus Mechanisms 

      Stevenson, Kamilla.; Skoglund, Oda. (Master thesis, 2021)
      Konsensus i Blockchains, ofte oppnådd med energikrevende Proof of Work (PoW) protokoller, er gjenstand for re-evaluering, som en følge av at nye Proof of Stake (PoS) protokoller vokser frem som gode alternativ. Disse ...
    • Design of Novel Energy-Efficient and Privacy-Preserving Blockchain Consensus Mechanisms 

      Stevenson, Kamilla; Skoglund, Oda (Master thesis, 2021)
      Konsensus i Blockchains, ofte oppnådd med energikrevende Proof of Work (PoW) protokoller, er gjenstand for re-evaluering, som en følge av at nye Proof of Stake (PoS) protokoller vokser frem som gode alternativ. Disse ...
    • Design of Trusted Systems with Reusable Collaboration Models 

      Herrmann, Peter; Kraemer, Frank Alexander (Journal article; Peer reviewed, 2007)
      We describe the application of our collaboration-oriented software engineering approach to the design of trust-aware systems. In this model-based technique, a specification does not describe a physical system component but ...
    • Designing a simple dynamic Digital Signage Network 

      Hagen, Andreas Ødegård (Master thesis, 2006)
      Digital Signage Networks (DSN) is a continious emerging digital advertisment medium. Display devices, typically large format plasma or LCD screens, are used to provide rich multimedia advertisments in shops, buses, at ...
    • Designing and developing a mobility solution for hospitals 

      Yang, Tong (Master thesis, 2015)
      With the development of communication technology, every industry has changed lot. This trend becomes more obvious in the age of smartphone and mobile internet. As for the medical industry, hospitals are facing new challenges ...
    • Designing for Redundancy: Nurses Experiences with the Wireless Nurse Call System 

      Klemets, Joakim Henrik M; Evjemo, Tor Erik; Kristiansen, Lill (Journal article; Peer reviewed, 2013)
      Patients rely on the nurse call system when in need of nurses’ assistance, while nurses rely on the nurse call system to coordinate work. In order to handle the highly mobile nature of nurses’ work, a wireless nurse call ...
    • Detecting Contract Cheating by using Stylometry and Keystroke Dynamics 

      Danielsen, Nils; Gravdal, Per Kristian (Master thesis, 2020)
      Utdanningssektoren er midt i en overgang til nye, digitaliserte måter å holde undervisning på. Med disse nye læringsformene, kommer nye måter å evaluere studentene på, for eksempel hjemmeeksamener over nettet eller større, ...
    • Detecting Contract Cheating by using Stylometry and Keystroke Dynamics 

      Gravdal, Per Kristian; Danielsen, Nils Folvik (Master thesis, 2020)
      Utdanningssektoren er midt i en overgang til nye, digitaliserte måter å holde undervisning på. Med disse nye læringsformene, kommer nye måter å evaluere studentene på, for eksempel hjemmeeksamener over nettet eller større, ...
    • Detecting contract cheating with behavioural biometrics 

      Pétursdóttir, Oddrún (Master thesis, 2021)
      Mange eksamener og andre innleveringer på universiteter blir gjennomført hjemmefra uten noen form for fjern-autentisering. Som en konsekvens av den pågående koronapandemien har antall hjemmeeksamener økt sammen med risikoen ...
    • Detecting Identity Thefts In Open 802.11e Enabled Wireless Networks 

      Holgernes, Eirik (Master thesis, 2010)
      Open wireless networks are commonly deployed as a result of easy access, user-friendliness, as well as easy deployment and maintance. These networks do not implement strong security features, and clients are prone to a ...
    • Detecting IMSI-Catcher Using Soft Computing 

      Nguyen, Hai Thanh; Nikolov, Momchil; Do, Van Thuan; Do, Thanh van (Journal article; Peer reviewed, 2015-11-12)
      Lately, from a secure system providing adequate user’s protection of confidentiality and privacy, the mobile communication has been degraded to be a less trustful one due to the revelation of IMSI catchers that enable ...
    • Detecting Intermediary Hosts by TCP Latency Measurements 

      Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2011)
    • Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer 

      Idland, Christer (Master thesis, 2011)
      In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such ...
    • Detecting malicious PDF documents 

      Kittilsen, Jarle (Master thesis, 2011)
      ENGELSK: As the internet has become the new playground for organized crime and foreign intelligence, the sophistication of internet attacks has increased. The traditional attacks targeting listening services on the target ...
    • Detecting Malicious Python Packages in the Python Package Index (PyPI) 

      Milje, Anders Aasrum (Master thesis, 2022)
      Deling av åpen kildekode er en vanlig praksis i store deler av moderne programvareutvikling. Å dele programvare sparer utallige ressurser for utviklere, ikke bare fordi dette reduserer utviklingstid, men også en kan være ...
    • Detecting malware with parent-child process relations 

      Gulbrandsøy, Bjørn Vidar Fasmer (Master thesis, 2023)
      Gjennomsnittlig tid mellom et datainnbrudd og oppdagelse er anslått til å være 207 dager. For å unngå oppdagelse fra signaturbasert deteksjon ved bruk av filhasher, trenger du bare å endre et enkelt tegn i filen. For å ...
    • Detecting modified network attacks through approximate matching 

      Kristensen, Kais (Master thesis, 2019)
      Deteksjon av cyberangrep ved hjelp av nettverkssensorer er svært utbredt, i den hensikt å monitorere og beskytte datanetteverk. Løsningene som benytter eksakte signaturer for å detektere ondsinnet aktivitet krever at ...
    • Detecting network anomalies in Ethernet /MPLS/IP networks using high resolution delay measurements 

      Henriksen, Ingvild Sørum (Master thesis, 2022)
      I dagens samfunn blir fler og fler tjenester digitalisert. Dette fører til at mer data flyter gjennom nettverkene, og et økende behov for å ha sikre nettverk for å unngå å få data på avveie. Denne studien undersøker i ...