Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 685-704 av 2543
-
Design of Backbone for Wireless Citywide Networks like Wireless Trondheim
(Master thesis, 2006)This master's thesis will investigate some of the technological solutions available for the construction of a backbone for a wireless citywide network (CWN), such as Wireless Trondheim, and a special attention is given ... -
Design of Novel Energy-Efficient and Privacy-Preserving Blockchain Consensus Mechanisms
(Master thesis, 2021)Konsensus i Blockchains, ofte oppnådd med energikrevende Proof of Work (PoW) protokoller, er gjenstand for re-evaluering, som en følge av at nye Proof of Stake (PoS) protokoller vokser frem som gode alternativ. Disse ... -
Design of Novel Energy-Efficient and Privacy-Preserving Blockchain Consensus Mechanisms
(Master thesis, 2021)Konsensus i Blockchains, ofte oppnådd med energikrevende Proof of Work (PoW) protokoller, er gjenstand for re-evaluering, som en følge av at nye Proof of Stake (PoS) protokoller vokser frem som gode alternativ. Disse ... -
Design of Trusted Systems with Reusable Collaboration Models
(Journal article; Peer reviewed, 2007)We describe the application of our collaboration-oriented software engineering approach to the design of trust-aware systems. In this model-based technique, a specification does not describe a physical system component but ... -
Designing a simple dynamic Digital Signage Network
(Master thesis, 2006)Digital Signage Networks (DSN) is a continious emerging digital advertisment medium. Display devices, typically large format plasma or LCD screens, are used to provide rich multimedia advertisments in shops, buses, at ... -
Designing and developing a mobility solution for hospitals
(Master thesis, 2015)With the development of communication technology, every industry has changed lot. This trend becomes more obvious in the age of smartphone and mobile internet. As for the medical industry, hospitals are facing new challenges ... -
Designing for Redundancy: Nurses Experiences with the Wireless Nurse Call System
(Journal article; Peer reviewed, 2013)Patients rely on the nurse call system when in need of nurses’ assistance, while nurses rely on the nurse call system to coordinate work. In order to handle the highly mobile nature of nurses’ work, a wireless nurse call ... -
Detecting Contract Cheating by using Stylometry and Keystroke Dynamics
(Master thesis, 2020)Utdanningssektoren er midt i en overgang til nye, digitaliserte måter å holde undervisning på. Med disse nye læringsformene, kommer nye måter å evaluere studentene på, for eksempel hjemmeeksamener over nettet eller større, ... -
Detecting Contract Cheating by using Stylometry and Keystroke Dynamics
(Master thesis, 2020)Utdanningssektoren er midt i en overgang til nye, digitaliserte måter å holde undervisning på. Med disse nye læringsformene, kommer nye måter å evaluere studentene på, for eksempel hjemmeeksamener over nettet eller større, ... -
Detecting contract cheating with behavioural biometrics
(Master thesis, 2021)Mange eksamener og andre innleveringer på universiteter blir gjennomført hjemmefra uten noen form for fjern-autentisering. Som en konsekvens av den pågående koronapandemien har antall hjemmeeksamener økt sammen med risikoen ... -
Detecting Identity Thefts In Open 802.11e Enabled Wireless Networks
(Master thesis, 2010)Open wireless networks are commonly deployed as a result of easy access, user-friendliness, as well as easy deployment and maintance. These networks do not implement strong security features, and clients are prone to a ... -
Detecting IMSI-Catcher Using Soft Computing
(Journal article; Peer reviewed, 2015-11-12)Lately, from a secure system providing adequate user’s protection of confidentiality and privacy, the mobile communication has been degraded to be a less trustful one due to the revelation of IMSI catchers that enable ... -
Detecting Intermediary Hosts by TCP Latency Measurements
(Journal article; Peer reviewed, 2011) -
Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer
(Master thesis, 2011)In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such ... -
Detecting malicious PDF documents
(Master thesis, 2011)ENGELSK: As the internet has become the new playground for organized crime and foreign intelligence, the sophistication of internet attacks has increased. The traditional attacks targeting listening services on the target ... -
Detecting Malicious Python Packages in the Python Package Index (PyPI)
(Master thesis, 2022)Deling av åpen kildekode er en vanlig praksis i store deler av moderne programvareutvikling. Å dele programvare sparer utallige ressurser for utviklere, ikke bare fordi dette reduserer utviklingstid, men også en kan være ... -
Detecting malware with parent-child process relations
(Master thesis, 2023)Gjennomsnittlig tid mellom et datainnbrudd og oppdagelse er anslått til å være 207 dager. For å unngå oppdagelse fra signaturbasert deteksjon ved bruk av filhasher, trenger du bare å endre et enkelt tegn i filen. For å ... -
Detecting modified network attacks through approximate matching
(Master thesis, 2019)Deteksjon av cyberangrep ved hjelp av nettverkssensorer er svært utbredt, i den hensikt å monitorere og beskytte datanetteverk. Løsningene som benytter eksakte signaturer for å detektere ondsinnet aktivitet krever at ... -
Detecting network anomalies in Ethernet /MPLS/IP networks using high resolution delay measurements
(Master thesis, 2022)I dagens samfunn blir fler og fler tjenester digitalisert. Dette fører til at mer data flyter gjennom nettverkene, og et økende behov for å ha sikre nettverk for å unngå å få data på avveie. Denne studien undersøker i ... -
Detecting network anomalies in Ethernet/MPLS/IP networks using Ethernet OAM performance data
(Master thesis, 2021)The effective monitoring of big data and telecom networks is becoming more and more crucial nowadays. Network anomalies can cause a decrease in performance , prevent the normal functioning of a network or put the network ...