• Gait analysis: Is it easy to learn to walk like someone else? 

      Stang, Øyvind (Master thesis, 2007)
      NORSK: I denne masteroppgaven skal vi undersøke hvorvidt det er lett eller vanskelig å lære seg å gå som en annen persons slik at en vil bli godkjent av et autentiseringssystem som baserer seg på ganglag. I de senere ...
    • Gait Mimicking: Attack Resistance Testing of Gait Authentication Systems 

      Mjaaland, Bendik Bjørklid (Master thesis, 2009)
      Biometric technology is rapidly evolving in today's society. A large part of the technology has its roots hundreds, or even thousands of years back in time, while other parts are new and futuristic. Research suggest that ...
    • Gait Recognition for Children over a Longer Period 

      Derawi, Mohammad; Balisane, Hewa; Bours, Patrick; Ahmed, Waqar; Twigg, Peter (Chapter; Peer reviewed, 2011)
    • Gait recognition under non-standard circumstances 

      Holien, Kjetil (Master thesis, 2008)
      This thesis will look at the biometric feature gait, and how different circumstances impact the ability to perform authentication. We will use an accelerometer sensor in order to record the data. First of all are we going ...
    • Gait Recognition using Time-of-Flight Sensor 

      Derawi, Mohammad; Ali, Hazem; Alaya Cheikh, Faouzi (Chapter; Peer reviewed, 2011)
    • Gait Recognition Using Wearable Motion Recording Sensors 

      Gafurov, Davrondzhon; Snekkenes, Einar (Journal article; Peer reviewed, 2009)
      This paper presents an alternative approach, where gait is collected by the sensors attached to the person's body. Such wearable sensors record motion (e.g. acceleration) of the body parts during walking. The recorded ...
    • Game Consoles - Are they secure? 

      Myrmo, Halvar (Master thesis, 2007)
      NORSK: De nye spillkonsollene og håndholdte maskinene som finnes på markedet i dag er designet med tanke på Internett og flerspiller muligheter. De er også designet for å vare i mange år og for å være koblet til Internett ...
    • Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense 

      Ask, Torvald Fossåen; Knox, Benjamin James; Lugo, Ricardo Gregorio; Hoffmann, Lukas; Sütterlin, Stefan (Peer reviewed; Journal article, 2023)
      In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively ...
    • Gamification of Incident Response Training for Small and Medium-Sized Businesses 

      Sivakumaran, Nireban (Master thesis, 2023)
      Denne avhandlingen utforsker rollen «gamification» har i å påvirke opplæring i beredskapsplanlegging, og trening for små og mellomstore bedrifter (SMB’er). Selv om fokuset er på SMB’er i Norge, kan funnene være anvendelige ...
    • Gamification of Information Security Awareness and Training 

      Gjertsen, Eyvind Gaarder Bull; Gjære, Erlend Andreas; Bartnes, Maria; Flores, Waldo Rocha (Chapter, 2017)
      Security Awareness and Training (SAT) programs are commonly put in place to reduce risk related to insecure behaviour among employees. There are however studies questioning how effective SAT programs are in terms of improving ...
    • Gathering Open Source Threat Intelligence from Twitter: An Integrated Supervised and Unsupervised Learning Approach 

      Kristiansen, Linn-Mari (Master thesis, 2020)
      Etterretning fra åpne kilder kan samles inn for mange formål, og innsamling av presis trusseletterretning fra åpne kilder kan være avgjørende når det kommer til effektiv håndtering av et cyberangrep. Spesifikke sårbarheter, ...
    • GDPR Compliance for Blockchain Applications in Healthcare 

      Hasselgren, Anton; Wan, Paul Kengfai; Horn, Margareth; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Chapter, 2020)
      The transparent and decentralized characteristics associated with blockchain can be both appealing and problematic when applied to a healthcare use-case. As health data is highly sensitive, it is therefore, highly regulated ...
    • GDPR Compliant Blockchain and Distributed Ledger Technologies in the Health Sector 

      Hasselgren, Anton; Kralevska, Katina; Gligoroski, Danilo; Faxvaag, Arild (Peer reviewed; Journal article, 2020)
    • GDPR, personvern, IT-sikkerhet i fagsystemer med GPS-sporing 

      Aasheim, Schulze Simon; Berntzen, Erik; Berntzen, Sondre; Lindaas, Morten (Bachelor thesis, 2021)
      GDPR og personvernreglementet i Norge stille store krav til alle bedrifter som nytter seg av GPS verktøy i yrkessammenheng, være det bruker eller utvikler. Det er en rekke vurderinger som må bli gjort i henhold til hvorvidt ...
    • GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance 

      Gonzalez, Andres Javier; Helvik, Bjarne Emil; Tiwari, Prakriti; Denis, Becker; Wittner, Otto Jonassen (Chapter, 2015)
      The dependability of ICT systems is vital for today's society. However, operational systems are not fault free. Providers and customers have to define clear availability requirements and penalties on the delivered services ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (Journal article; Peer reviewed, 2018)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ...
    • A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling 

      Khodabakhsh, Ali; Busch, Christoph (Chapter, 2020)
      Photo- and video-realistic generation techniques have become a reality following the advent of deep neural networks. Consequently, there are immense concerns regarding the difficulty in differentiating what content is real ...
    • Generating historical network logs for cyber range exercises 

      Isnes, Christian Simoes (Master thesis, 2023)
      Cyberangrep blir stadig mer vanlige, og studier viser at trusler fra Advanced Persistance Threats (APT'er), øker eksponentielt. Trening av cybersikkerhetsprofesjonelle i realistiske miljøer er avgjørende for å være forberedt ...
    • Generic Metadata Time Carving 

      Porter, Kyle (Peer reviewed; Journal article, 2020)
      Recovery of files can be a challenging task in file system investigations, and most carving techniques are based on file signatures or semantics within the file. However, these carving techniques often only recover the ...