Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 947-966 av 2578
-
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
(Peer reviewed; Journal article, 2023)Purpose Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance ... -
Exploring the Usefulness of Machine Learning in the Context of WebRTC Performance Estimation
(Chapter, 2019)We address the challenge faced by service providers in monitoring Quality of Experience (QoE) related metrics for WebRTC-based audiovisual communication services. By extracting features from various application-layer ... -
Exploring Trojanized Closed-Source Software Supply Chain Attacks Through Differential Malware Analysis
(Master thesis, 2023)I de siste årene så har det vært en økning av angrep gjennom kompromittert forsyninskjede for programvare. SolarWinds angrepet i 2020 var et ondsinnet angrep som ble gjennomført av en avansert trussel aktør som hadde hold ... -
Extended Abstract - Alternative Taxation Scheme for Controlling Rebound Effects in Streaming Services
(Peer reviewed; Journal article, 2023) -
Extended Presentation System (EXPRESS)
(Master thesis, 2008)Persuasion is the process of guiding people toward the adoption of an idea, attitude, or action by rational and symbolic (though not always logical) means. Persuasion is as old as humanity itself, and records exist to show ... -
An Extensive Analysis of Email Phishing - Properties, Detection, and Successful Phishing
(Student paper, others, 2022)Phishing as a form of Social Engineering has a prominent presence in today’s threat landscape, and can result in devastating losses if successful. This paper presents an analysis of the phishing emails that have been ... -
Extracting Cyber Threat Intelligence From Hacker Forums
(Master thesis, 2017)The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive ... -
Extraction and fusion of spectral parameters for face recognition
(Proceedings of SPIE;7877, Journal article; Peer reviewed, 2011)Many methods have been developed in image processing for face recognition, especially in recent years with the increase of biometric technologies. However, most of these techniques are used on grayscale images acquired in ... -
Face recognition in a border control environment: non-zero effort attacks' effect on false acceptance rate
(Master thesis, 2005)NORSK: Ansiktsgjenkjenning er en biometrisk autentiseringsmetode som har blitt mer og mer relevant de siste årene. Fra å være for unøyaktig, har det blitt en mer moden teknologi som skal brukes i det nye Visa Information ... -
Facebook in the Physical World
(Master thesis, 2008)This thesis investigates the idea of bringing an online social community into a public space. The concept is about building a bridge between an online social community and the physical world. We built a prototype public ... -
Facial authentication service with a privacy-preserving focus
(Bachelor thesis, 2022)Mobai ønsket å utnytte sine biometriske tjenester til å bygge en OpenID Connect-leverandør med vedvarende lagring av biometriske data som både er sikkert og overholder prinsipper for personvern. Gjennom hele prosjektet ble ... -
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
(Peer reviewed; Journal article, 2023)Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, ... -
Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
(Chapter, 2017)The purpose of this study is to investigate various factors that can affect the willingness of the IT professionals in Norway to share their knowledge in the open communities of practice. The study is conducted through an ... -
Factors influencing QoE of video consultations
(Peer reviewed; Journal article, 2021)During the Covid-19 pandemic, the use of videoconferencing for medical consultations between patients and general practitioners (GPs) has strongly increased. The aim of this work-in-progress paper is to investigate which ... -
Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice
(Chapter, 2017)The purpose of this study is to contribute to a better understanding of the current status of the participation of the information security professionals (ISPs) in the electronic communities of practice (eCoP) in the ... -
Factors Influencing the Pricing Structure of Dark Fibers for Long Haul Communication
(Master thesis, 2018)The society today are becoming more and more connected. All new devices are connected to the Internet, transmitting data to the cloud making it possible for users to remotely control anything from anywhere, and virtually ... -
Failure analysis and prediction in compound system by wavelets
(Master thesis, 2016)The current overall ICT infrastructure mainly the Internet and Telecom networks can be looked upon as an ecosystem, which is the result of the cooperation between a huge number of Autonomous systems (ASes). The interconnection ... -
Failure Impact, Availability and Cost Analysis of PONs Based on a Network Geometric Model
(Journal article; Peer reviewed, 2014) -
Failure Process Characteristics of Cloud-Enabled Services
(Chapter; Peer reviewed, 2017)The design of cloud computing technologies need to guarantee high levels of availability and for this reason there is a large interest in new fault tolerant techniques that are able to keep the resilience of the systems ... -
Fair Airtime Allocation for Content Dissemination in WiFi-Direct-Based Mobile Social Networks
(Chapter, 2017)The vast penetration of smart mobile devices provides a unique opportunity to make mobile social networking pervasive by leveraging the feature of short-range wireless communication technologies (e.g. WiFi Direct). In this ...