• Financial Aspects of the Online Gaming Service Industry 

      Larsen, Christer-Andre (Master thesis, 2011)
      The goal of this thesis is to identify and analyze the dominant revenue models in the OGS industry, as well as the logic behind the choice of a specific model. Identification of the prevalent models and their characteristics ...
    • Finding Educationally Friendly Malware 

      Bjørkhaug, Aleksander (Master thesis, 2021)
      Denne rapporten er en masteroppgave som har mål om å undersøke hva utdanningsvennlig skadevare kan være, og hjelpe lærere med å finne dem. Vi ønsker å finne hva som identifiserer skadevaren som utdanningsvennlig, og lage ...
    • Finding weaknesses in web applications through the means of fuzzing 

      Hammersland, Rune (Master thesis, 2008)
      NORSK: Håndtering av brukerinput i web-applikasjoner har ved flere anledninger vist seg å være en vanskelig oppgave. Gang på gang har vi sett sårbarheter i slike applikasjoner på grunn av måten input benyttes uten å ...
    • Fine tuning BERT for detecting cyber grooming in online chats 

      Melleby Aarnseth, Simen (Master thesis, 2023)
      This thesis will look into how cyber grooming may be detected through the natural language processing model BERT, with an emphasis on the use of abbreviations and slang present in the chats. To investigate this, several BERT ...
    • Finger Vein Indexing using Unsupervised Clustering 

      Surbiryala, Jayachander (Master thesis, 2015)
      Finger vein recognition systems have gained more popularity recently, and it is one of the most reliable biometric modality. Finger veins are present inside the finger, and its pattern is not known which makes it hard to ...
    • Fingerphoto Verification Using Siamese Neural Network 

      Madhun, Ahmed Said Mahmoud (Master thesis, 2020)
      De siste årene har vi hatt en enorm utvikling av portable enheter. Sensorene i smart-telefoner og bærbare datamaskiner har kommet til det stadiet at de åpner for nye former for biometrisk autentisering. En av disse formene ...
    • Fingerprint Image Quality: Predicting Biometric Performance 

      Olsen, Martin Aastrup (Doctoral Dissertations at Gjøvik University College;5-2015, Doctoral thesis, 2015-11-30)
      Biometric systems and fingerprint recognition systems in particular have become very widespread in the recent years, both in mobile devices and through increased usage in border controls and electronic national identification ...
    • Fingerprintløsning for lokalisering ved bruk av WLAN 

      Wiese, Gerhard Christoffer (Master thesis, 2010)
      I forbindelse med denne masteroppgaven har det blitt designet, implementert og testet en nettsentrert lokaliseringsløsning for WLAN. Løsningen baserer seg på innsamling av lokasjonsdata i form av lokasjonsfingeravtrykk. ...
    • FiPrAD - A Guideline for Fingerprint Presentation Attack Database Creation 

      Madhun, Ahmed S. M. (Bachelor thesis, 2018)
      Abstract: Nowadays, biometric recognition systems are widely implemented in many personal devices like smartphones and laptops, as it provides higher security while identifying the real owners of these devices. Fingerprint ...
    • Firewall models in cloud environments 

      Thingnes, Lars Gunnar (Master thesis, 2022)
      Denne oppgaven undersøker hvordan tradisjonelle sentraliserte og sonebaserte brannmurer kan migreres til moderne mikrosegmenterte og virtuelt distribuerte brannmurer. En slik migrering anses som en høy risiko siden den ...
    • Fjernavlesning av vannmålere med LoRa-teknologi 

      Kristensen, Daniel B.; Barhaugen, Kevin A.; Skaue, Kristian A.; Solstad, Hans Kristian T. (Bachelor thesis, 2019)
      I dag blir all vannavlesning i Ringsaker kommune gjort manuelt av huseierene. Teknisk drift i Ringsaker kommune er interessert i å automatisere denne prosessen, og LoRaWAN er en teknologi som kan bli brukt for å muliggjøre ...
    • Fleet Management Optimisation 

      Soltun, Sindre (Master thesis, 2007)
      This Master's Thesis is built around the concept of fleet management, focusing on designing and implementing a solution for such a purpose. As a target domain for this proposed system snow clearing has been chosen, and it ...
    • Fog Computing in Healthcare – A Review and Discussion 

      Kraemer, Frank Alexander; Bråten, Anders Eivind; Tamkittikhun, Nattachart; Palma, David (Journal article; Peer reviewed, 2017)
      Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ...
    • Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims 

      Berg, Silje; Thorvik, Tilde Gregusson; Meland, Per HÃ¥kon (Journal article; Peer reviewed, 2023)
      Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ...
    • Forecasting Electricity Load With Hybrid Scalable Model Based on Stacked Non Linear Residual Approach 

      Sinha, Ayush; Tayal, Raghav; Vyas, Aamod; Pandey, Pankaj; Vyas, O.P. (Peer reviewed; Journal article, 2021)
      Power has totally different attributes than other material commodities as electrical energy stockpiling is a costly phenomenon. Since it should be generated when demanded, it is necessary to forecast its demand accurately ...
    • Forensic analysis of an unknown embedded device 

      Eide, Jarle; Olsen, Jan Ove Skogheim (Master thesis, 2006)
      Every year thousands of new digital consumer device models come on the market. These devices include video cameras, photo cameras, computers, mobile phones and a multitude of different combinations. Most of these devices ...
    • Forensic Analysis of OOXML Documents 

      Didriksen, Espen (Master thesis, 2014)
      Microsoft Office 2007 and subsequent versions use an XML-based file format called Office Open XML (OOXML) for storing documents, spreadsheets and presentations. OOXML documents are often collected in forensic investigations, ...
    • Forensic Analysis of Physical Memory and Page File 

      Iqbal, Hameed (Master thesis, 2009)
      With the passage of time, the field of computer forensics is maturing and the traditional methodology of disk forensics has now become a standard. In the same manner volatile data forensics is also getting serious attention ...
    • Forensic Key Discovery and Identification: Finding Cryptographic Keys in Physical Memory 

      Maartmann-Moe, Carsten (Master thesis, 2008)
      Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present ...
    • Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode 

      Alendal, Gunnar; Dyrkolbotn, Geir Olav; Axelsson, Stefan (Journal article; Peer reviewed, 2018)
      The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security ...