Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på dokumenttype "Journal article"
Viser treff 1-20 av 720
-
3-D Face Morphing Attacks: Generation, Vulnerability and Detection
(Journal article; Peer reviewed, 2024)Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction ... -
A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness
(Journal article; Peer reviewed, 2023)Background: Cyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness. Previous studies suggested that communication ... -
5G Network Slicing as an Enabler for Smart Distribution Grid Operations
(Journal article; Peer reviewed, 2019)The power distribution grid has to undergo substantial modifications in order to meet the future electricity needs. The increased flexibility in power consumption, local production and storage insist on smarter supervisory ... -
5G Network Slicing for Wi-Fi Networks
(Journal article, 2021)Future networks will pave the way for a myriad of applications with different requirements and Wi-Fi will play an important role in local area networks. This is why network slicing is proposed by 5G networks, allowing to ... -
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
(Journal article; Peer reviewed, 2017)In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ... -
A Framework for the Validation of Network Artifacts
(Journal article; Peer reviewed, 2019) -
A Measurement-Driven Approach to Understand Urban Greenhouse Gas Emissions in Nordic Cities
(Journal article, 2016)Cities are main drivers for climate change mitigation and emission reduction today. However, in many cases they lack reliable baselines of emissions to validate current developments over time, assess the impact of their ... -
A new QoE fairness index for QoE management
(Journal article; Peer reviewed, 2018)The user-centric management of networks and services focuses on the Quality of Experience (QoE) as perceived by the end user. In general, the goal is to maximize (or at least ensure an acceptable) QoE, while ensuring ... -
A Proof-of-Concept Demonstration of Isolated and Encrypted Service Function Chains
(Journal article; Peer reviewed, 2019)ontemporary Service Function Chaining (SFC), and the requirements arising from privacy concerns, call for the increasing integration of security features such as encryption and isolation across Network Function Virtualisation ... -
A Review of Asset-Centric Threat Modelling Approaches
(Journal article; Peer reviewed, 2020)Abstract: The threat landscape is constantly evolving. As attackers continue to evolve and seek better methods of compro-mising a system; in the same way, defenders continue to evolve and seek better methods of protecting ... -
A Self-Adaptive Network for HPC Clouds: Architecture, Framework, and Implementation
(Journal article; Peer reviewed, 2018)Clouds offer flexible and economically attractive compute and storage solutions for enterprises. However, the effectiveness of cloud computing for high-performance computing (HPC) systems still remains questionable. When ... -
A Simple Algorithm for Estimating Distribution Parameters from n -Dimensional Randomized Binary Responses
(Journal article; Peer reviewed, 2018)Randomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple ... -
A Socio-Technical Framework to Improve cyber security training: A Work in Progress
(Journal article; Peer reviewed, 2019)In this paper we discuss a work in progress to create a socio-technical system design framework for cyber security training exercises (STSD-CSTE) to support the development of cyber security training in the Norwegian Cyber ... -
A Socio-technical Systems Approach to Design and Support Systems Thinking in Cybersecurity and Risk Management Education
(Journal article; Peer reviewed, 2019)Cybersecurity decisions are made across a range of social, technical, economic, regulatory and political domains. There is a gap between what companies and institutions plan to do while developing their internal IS-related ... -
A Statistical Property of Wireless Channel Capacity: Theory and Application
(Journal article; Peer reviewed, 2017)This paper presents a set of new results on wireless channel capacity by exploring its special characteristics. An appealing discovery is that the instantaneous and cumulative capacity distributions of typical fading ... -
A Survey of Automated Information Exchange Mechanisms Among CERTs
(Journal article; Peer reviewed, 2019)Nowadays innovative computer related exploits are released every single day, which makes researching about those exploits a significant task. A CERT (Computer Emergency Response Team) is an expert group that is responsible ... -
A Survey of QoS Multicast in Ad Hoc Networks
(Journal article; Peer reviewed, 2010-09-14)This survey on Quality of Service (QoS) in multicast ad hoc networks uses a framework based on the mechanisms in three important elements: resource estimations, multicast tree/mesh administration, and multicast routing. ... -
A Systematic Literature Review on Military Software Defined Networks
(Journal article; Peer reviewed, 2018)Software Defined Networking (SDN) is an evolving network architecture paradigm that focuses on the separation of control and data planes. SDN receives increasing attention both from academia and industry, across a multitude ... -
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
(Journal article; Peer reviewed, 2012) -
Accelerated Simultaneous Perturbation Stochastic Approximation for Tracking Under Unknown-but-Bounded Disturbances
(Peer reviewed; Journal article, 2022)In this paper, we propose an accelerated version of Simultaneous Perturbation Stochastic Approximation (Accelerated SPSA). This algorithm belongs to the class of methods used in derivative-free optimization and has proven ...