Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 920-939 av 2626
-
Evaluating the Effect of Satellite Communication on the Data Dissemination Protocol CAMFlooP in Areas with Limited Cellular Connectivity
(Master thesis, 2023)Dagens mobile nett har flere soner uten dekning, hvilket er synlig på sider som nperf.com. Biler som befinner seg i disse sonene kan derimot kommunisere med hverandre med lokale nettverk de oppretter. På denne måten kan ... -
Evaluating the Security and Usability of Emoji-Based Authentication
(Master thesis, 2018)With the increasing digitization of the world, there is a growing need to prove one's identity and to restrict access to both personal and corporate data. Passwords have several drawbacks, but are still the preferred choice ... -
Evaluating the smoothness of color transformations
(Proceedings of SPIE;7866, Journal article; Peer reviewed, 2011)Multi-dimensional look up tables (LUTs) are widely employed for color transformations due to its high accuracy and general applicability. Using the LUT model generally involves the color measurement of a large number of ... -
Evaluating the use of Microsoft Sentinel as Security Information Event Management (SIEM)
(Master thesis, 2023)Denne masteroppgaven gir en omfattende evaluering av Microsoft Sentinel, spesifikt som en løsning for Security Information and Event Management (SIEM), innenfor rammen av HEMITs nåværende infrastruktur. Studien gransker ... -
Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases
(Peer reviewed; Journal article, 2023)In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment ... -
Evaluation of Algorithms for the Determination of Color Gamut Boundaries
(Journal article; Peer reviewed, 2010)Several techniques for the computation of gamut boundaries have been presented in the past. In this article we take an in-depth look at some of the gamut boundary descriptors used when performing today's gamut mapping ... -
Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks
(Chapter, 2019)Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches ... -
Evaluation of K-Means Time Series Clustering Based on Z-Normalization and NP-Free
(Peer reviewed; Journal article, 2024)Despite the widespread use of k-means time series clustering in various domains, there exists a gap in the literature regarding its comprehensive evaluation with different time series preprocessing approaches. This paper ... -
Evaluation of SDN in Small Wireless-capable and Resource-constrained Devices
(Master thesis, 2017)Software Defined Networking (SDN) has recently emerged as the promising network architecture paradigm that is believed to revolutionize the networking world by making it more intelligent, flexible and programmable. SDN has ... -
Evaluations of Cyber Security Education Material for School Students from a Transactional Analysis Perspective
(Master thesis, 2019)I 2014 kostet svak informasjonssikkerhet det norske samfunnet 19 milliarder kroner [1]. ID-tyveri, stjeling av bedriftshemmeligheter og løsepengevirus er noen av hendelsene som kan oppstå. Fokuset på informasjonssikkerhet ... -
Evaluerings- og testkriterier for trådløse datanettverk
(Master thesis, 2006)Den økte utbredelsen av trådløse datanettverk har ført til en rekke forskjellig trådløst nettverksutstyr på markedet. Det blir produsert utstyr både til hjemmemarkedet og bedriftsmarkedet, og utstyret er tilpasset og ... -
Event Driven Adaptive Security in Internet of Things
(Chapter, 2014)With Internet of Things (IoT), new and improved personal, commercial and social opportunities can be explored and availed. However, with this extended network, the corresponding threat landscape will become more complex ... -
Evidence in the fog – Triage in fog computing systems
(Journal article; Peer reviewed, 2023)Fog computing promises improved service scalability and lower latency for IoT systems. The concept closes the gap between full computing capabilities at the network's edge and cloud systems' centrally located processing ... -
Evidential Reasoning for Forensic Readiness
(Peer reviewed; Journal article, 2016)To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for ... -
Evolution of the SIM to eSIM
(Master thesis, 2013)Abstract Every GSM (Global System for Mobile Communications) phone, also called 2G mobile phone and every UMTS (Universal Mobile Telecommunications System) phone, aka 3G mobile phone requires a smart card to connect and ... -
Evolutionary optimization of on-line multilayer perceptron for similarity-based access control
(Chapter, 2017)Neural Networks have been successfully used in different fields of Information Security such that network intrusion detection and malware analysis because of ability to provide high level of abstraction for complex and ... -
Examining the suitability of industrial safety management approaches for information security incident management
(Journal article; Peer reviewed, 2016) -
Exercise Games for Elderly People: Identifying important aspects, specifying system requirements and designing a concept
(Master thesis, 2013)The aim of this study is to identify important aspects of an exergame for elderly, and based on this, specify system requirements and develop a concept for an exergame. Due to "baby boomers" and the fact that people live ... -
Expanded combinatorial designs as tool to model network slicing in 5G
(Journal article; Peer reviewed, 2019)The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into ... -
Expanding the Capabilities of Cyber Range Attack Agents
(Master thesis, 2022)Enheter knyttet til Tingenes Internett (IoT)-domenet er i ferd med å bli en del av vårt daglige liv; fra kroppsmonitorer til kritisk infrastruktur brukes de overalt. Dette gjør dem til ideelle mål for aktører som ønsker å ...