• Forretningsmodeller for trådløsutbygging langs vei 

      Hagan, Bjørn-Viggo (Master thesis, 2007)
      Utviklingen av trådløse teknologier gir opphav til stadig flere bruksområder. I denne oppgaven har jeg sett på tre av dem, nemlig kommunikasjon med kjøretøy i fart, SRO for veibelysning og vei-instrumentering. For hvert ...
    • Forretningspotensialet til Wi-Fi basert løsning for automatisk måleravlesning 

      Holla, Morten Lunde (Master thesis, 2011)
      Fokuset for denne oppgaven har vært å innhente informasjon om avansertemåle- og styringssystem (AMS) for å kunne vurdere potensialet for en Wi-Filøsning for AMS. Dette fordi det allerede i dag finnes store og profesjoneltdrevet ...
    • Forwarding algorithms in vehicular networks 

      Afroozeh, Amir (Master thesis, 2014)
      AbstractVehicular ad hoc networks are a kind of mobile ad hoc network in which themobile nodes are fast moving vehicles. The fast movement of vehicles causesconsiderable disconnections in network links and leads to changes ...
    • A Framework for Flexible Program Evolution and Verification of Distributed Systems 

      Owe, Olaf; Fazeldehkordi, Elahe; Lin, Jia-Chun (Peer reviewed; Journal article, 2020)
      Program evolution may reveal bad design decisions, misunderstandings, erroneous code, or erroneous specifications, because problems made early in the design of a system may not be discovered until much later in the life-time ...
    • Framework for generating IDS benchmarking Data sets 

      Skjølsvik, Stian (Master thesis, 2007)
      Benchmarking Intrusion Detection Systems, IDS, is needed for comparing different systems against each other and to determine how good a single system is. For this purpose there is a need to generate test data set, which ...
    • Framework for secure data collection and through integration with various APIs 

      Schonhowd, Sindre Davidsen; Voll, Magnus Lekanger; Wahlstrøm, Øivind (Bachelor thesis, 2023)
      Tussa er ett norskt selskap lokalisert på vestlandet som arbeider for å skape fremtidsrettet og miljøvennlige løsninger. Tussa ønsket en forbedret løsning på datainnsamlingen fra sine kunder gjennom Microsoft Intune, Cisco ...
    • A Framework for Spatial and Temporal Evaluation of Network Disaster Recovery 

      Gajic, Marija; Heegaard, Poul Einar; Furdek, Marija (Chapter, 2020)
      The support of vital societal functions requires a reliable communication network, especially in the presence of crises and disastrous events. Disasters caused by natural factors including earthquakes, fires, floods or ...
    • A framework for using humanoid robots in the school learning environment 

      Mishra, Deepti; Parish, Karen; Lugo, Ricardo Gregorio; Wang, Hao (Peer reviewed; Journal article, 2021)
      With predictions of robotics and efficient machine learning being the building blocks of the Fourth Industrial Revolution, countries need to adopt a long-term strategy to deal with potential challenges of automation and ...
    • Freely-Drifting Small-Satellite Swarms for Sensor Networks in the Arctic 

      Birkeland, Roger; Palma, David (Chapter, 2018)
      Satellite communications have been widely used to provide connectivity around the world. However, regions such as the Arctic still have limited coverage, despite the need to monitor this region. Currently, several sensors ...
    • Fremtidsrettet bredbåndsscenario 

      Hagen, Øystein Bøhn (Master thesis, 2007)
      Utbygging av infrastruktur for bredbånd er et felt regjeringen i Norge satser på ettersom bredbånd nærmest er en forutsetning i et moderne samfunn. Samtlige husstander skal i følge Soria Moria-erklæringen ha tilbud om ...
    • From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks 

      Amro, Ahmed Walid; Gkioulos, Vasileios (Chapter, 2022)
      The maritime domain is among the critical sectors of our way of life. It is undergoing a major digital transformation introducing changes to its operations and technology. The International Maritime Organization urged the ...
    • From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes 

      Augusto-Gonzalez, Javier; Collen, Anastasija; Evangelatos, S; Anagnostopoulos, Marios; Spathoulas, Georgios; Giannoutakis, Konstantinos M.; Votis, Konstantinos; Tzovaras, Dimitrios; Genge, B; Gelenbe, Erol; Nijdam, Niels Alexander (Peer reviewed; Journal article, 2019)
      The H2020 European research project GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control - aims to deploy a highly effective security framework for IoT smart home residents through a novel ...
    • From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange 

      de Kock, Bastiaan Borgert (Doctoral theses at NTNU;2023:201, Doctoral thesis, 2023)
      Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. ...
    • From Password to Passwordless: Exploring User Experience Obstacles to the Adoption of FIDO2 Authentication 

      Furuberg, Ingunn Langtangen; Øseth, Marie (Master thesis, 2023)
      Fast Identity Online (FIDO) Alliance har utviklet standarder for å redusere avhengigheten av passordbasert autentisering. FIDO2 er en passordløs autentiseringsstandard som tilbyr autentisering mot nettbaserte tjenester. ...
    • From Password to Passwordless: Exploring User Experience Obstacles to the Adoption of FIDO2 Authentication 

      Furuberg, Ingunn Langtangen; Øseth, Marie (Master thesis, 2023)
      Fast Identity Online (FIDO) Alliance har utviklet standarder for å redusere avhengigheten av passordbasert autentisering. FIDO2 er en passordløs autentiseringsstandard som tilbyr autentisering mot nettbaserte tjenester. ...
    • From QoS Distributions to QoE Distributions: a System's Perspective 

      Hossfeld, Tobias; Heegaard, Poul Einar; Skorin-Kapov, Lea; Varela, Martin; Fiedler, Markus (Chapter, 2020)
      In the context of QoE management, network and service providers commonly rely on models that map system QoS conditions (e.g., system response time, paket loss, etc.) to estimated end user QoE values. Observable QoS conditions ...
    • From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS 

      Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas (Chapter, 2016)
      Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all ...
    • Fulfilling efficiently SLA availability guarantees in backbone networks 

      Tiwari, Prakriti (Master thesis, 2014)
      The availability and reliability of backbone networks is important tosociety. However, physical, software and unintentional human errorfailures affect the links and nodes in a backbone network. To overcomesuch failures in ...
    • Full Reference Image Quality Assessment Based on Saliency Map Analysis 

      Tong, Yubing; Konik, Hubert; Cheikh, Faouzi Alaya; Tremeau, Alain (Journal article; Peer reviewed, 2010)
      Region saliency has not been fully considered in most previous image quality assessment models. In this article, the contribution of any region to the global quality measure of an image is weighted with variable weights ...
    • Full-fingerprint Volumetric Subsurface Imaging using Fourier-Domain Optical Coherence Tomography 

      Sousedik, Ctirad; Breithaupt, Ralph (Chapter, 2017)
      Despite the long history of automated fingerprint recognition, the state-of-the-art 2D sensors still struggle with abraded, dry, wet or greasy fingers, as well as extra-soft skin of the infant fingerprints. But above all, ...