Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Subject "VDP::Informasjons- og kommunikasjonsteknologi: 550"
Now showing items 1-6 of 6
-
All in a day's work: Password cracking for the rest of us
(Chapter, 2009)The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ... -
Autonomous Flow-Based TSCH Scheduling for Heterogeneous Traffic Patterns: Challenges, Design, Simulation, and Testbed Evaluation
(Peer reviewed; Journal article, 2023)The Industrial Internet of Things needs wireless communication with bounded latency and stronger robustness. Nodes employing the Time Slotted Channel Hopping (TSCH) MAC operate according to a schedule, and recent work on ... -
Event Driven Adaptive Security in Internet of Things
(Chapter, 2014)With Internet of Things (IoT), new and improved personal, commercial and social opportunities can be explored and availed. However, with this extended network, the corresponding threat landscape will become more complex ... -
On Low-Cost Privacy Exposure Attacks in LTE Mobile Communication
(Journal article; Peer reviewed, 2017)Abstract The security of mobile communication is of great interest nowadays because of the wide spread and extensive use of mobile communication worldwide. Although LTE has been designed to provide better security than ... -
An Ontological Framework to Facilitate Early Detection of ‘Radicalization’ (OFEDR)—A Three World Perspective
(Peer reviewed; Journal article, 2021)This paper presents an ontology that involves using information from various sources from different disciplines and combining it in order to predict whether a given person is in a radicalization process. The purpose of the ... -
Paralyzed or Compromised: A Case Study of Decisions in Cyber-Physical Systems
(Peer reviewed; Journal article, 2024)Human operators of Cyber-Physical Systems (CPSs) within Critical Infrastructure (CI) need to protect their systems from cyber-attacks. When CPSs are compromised the operators might be faced with the dilemma of letting the ...