Now showing items 724-743 of 2594

    • Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles 

      Borj, Parisa Rezaee; Raja, Kiran; Bours, Patrick (Chapter, 2021)
      Securing the safety of the children on online platforms is critical to avoid the mishaps of them being abused for sexual favors, which usually happens through predatory conversations. A number of approaches have been ...
    • Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ...
    • Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements 

      Pedersen, Øystein Aas (Master thesis, 2010)
      The most common gateway for executing attacks in 802.11 networks are the MACspoofing attack. Current Todays Wireless IDS implements different methods todetect MAC spoofing, but are particularly interested in using methods ...
    • Detection of cyber grooming during an online conversation 

      Kulsrud, Halvor Bugge (Master thesis, 2019)
      Internett fasilitert grooming er et fremtredende samfunnsproblem, og få løsninger for å mitigere problemet eksisterer. Én av fem midreårige har vært utsatt for uønsket seksuelt innhold, og en av ni har opplevd uønskede ...
    • Detection of Glasses in Near-Infrared Ocular Images 

      Drozdowski, Pawel; Struck, Florian; Rathgeb, Christian; Busch, Christoph (Chapter, 2018)
      Eyeglasses change the appearance and visual perception of facial images. Moreover, under objective metrics, glasses generally deteriorate the sample quality of near-infrared ocular images and as a consequence can worsen ...
    • Detection of Hidden Software Functionality 

      Jensen, Jostein (Master thesis, 2007)
      Downloading software from unknown sources constitutes a great risk. Studies have described file-sharing networks where the probability of downloading infected files is as high as 70% [1] under certain circumstances. This ...
    • Detection of intermediary hosts through TCP latency propagation 

      Singh, Gurvinder (Master thesis, 2009)
      Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The ...
    • Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints 

      Idland, Christer; Jelle, Thomas; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2013)
      Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized ...
    • Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Chapter, 2021)
      Recently it has been shown, that it is possible to detect malware based on the memory access patterns produced before executions reaches its Entry Point. In this paper, we investigate the usefulness of memory access patterns ...
    • Detection of Running Malware Before it Becomes Malicious 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2020)
      As more vulnerabilities are being discovered every year [17], malware constantly evolves forcing improvements and updates of security and malware detection mechanisms. Malware is used directly on the attacked systems, thus ...
    • Detection of Synthetic Videos using Temporal Convolutional Networks 

      Abrahamsen, Simen Ege (Master thesis, 2021)
      Å generere ansiktssyntetiserte videoer er ikke en ny teknologi. Dette er noe som er gjort i flere år ved bruk av visuelle effekter og dataanimasjon. Hittil har dette krevd avansert kunnskap innen videoredigering for å oppnå ...
    • Detection of worms in error diffusion halftoning 

      Pedersen, Marius; Albregtsen, Fritz; Hardeberg, Jon Yngve (Proceedings of SPIE;7242, Journal article; Peer reviewed, 2009)
      Digital halftoning is used to reproduce a continuous tone image with a printer. One of these halftoning algorithms, error diffusion, suffers from certain artifacts. One of these artifacts is commonly denoted as worms. We ...
    • Determining the age and gender of an individual based on text classification - Comparing two binary classifications with one 4-class classification 

      Kløvvik, Emiil (Master thesis, 2021)
      Alder og kjønndeteksjon er en av verktøyene som kan brukes for å sørge for en form for sikkerhet i chatterom. Ved å finne riktig aldersgruppe på en bruker ved hjelp av teksten den har skrevet, kan denne studien beskytte ...
    • Developing a Cyber Template to improve communication during Cyber Threat Situations 

      Wråli, Kristian (Master thesis, 2023)
      En cybertrusselsituasjon oppstår når en organisasjon blir angrepet av et cyberangrep. For å begrense mulig skade og gjenopprette normal drift er kommunikasjon avgjørende. Informasjon om cybertrusselsituasjonen må kommuniseres ...
    • Developing a Framework for Cybersecurity Evaluation in the Consumer Internet of Things 

      Dahl, Kristoffer; Storeng, Jan Olaf; Strøm, Jørgen Oliver; Svidal, Nikolai (Bachelor thesis, 2022)
      Fagfeltet IoT består av en mengde verktøy, teknologier og metoder som er under utvikling. Gjennom sensorer og bruk av applikasjoner, samler, prosesserer, genererer og forflytter enheten informasjon som kan være sensitiv ...
    • Developing a testbed for Intelligent Transportation Systems 

      Hansen, Ole Andreas (Master thesis, 2018)
      It is estimated that the average UK commuter spent on average 32 hours stuck in traffic jams in 2017 and that our car park is growing from 1.2 billion cars to 2 billion cars within 2035. In recent years there has been ...
    • Developing a Testbed for VANET Protocols using Drones 

      Groven, Halvor (Master thesis, 2021)
      Antallet biler i trafikken øker hver dag. Dette resulterer i voksende utfordringer relatert til økt trafikkbelastning- og sikkerhet, og ny teknologi og nye løsninger må utvikles for å adressere disse utfordringene. I ...
    • Developing a Web Application for Smart Home Technology 

      Lundeland, Jonas; Waage, Øystein (Master thesis, 2012)
      With AMS comes great possibilities for increased energy efficiency, but to achieve its full potential, the end users must be provided with the necessary means of monitoring and controlling their consumption. This thesis ...
    • Developing Android Applications with Arctis 

      Haugsrud, Stephan (Master thesis, 2009)
      The focus of this thesis is the design of Android applications from building blocks in Arctis. The Arctis tool is used for modeling applications with UML activities, which already can be deployed on the Java ME and Java ...
    • Developing E-tourism services 

      Power, Caroline Synnøve (Master thesis, 2007)
      The SPICE platform simplifies the creation, testing and deployment of customized, personalized and context-aware mobile services. This opens up new prospects for E-tourism services, which give business travellers and ...