• I still know who you are! Soft Biometric Keystroke Dynamics performance with distorted timing data 

      Moe, Tobias (Master thesis, 2021)
      Bruken av keystroke dynamics some en autentiserings metode er et godt undersøkt felt. I keystroke dynamics så bruker vi skrive måten, i tillegg til brukernavn og password, når vi autentiserer. En av problem stillingene som ...
    • ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing 

      Toftegaard, Øyvind Anders Arntzen (Master thesis, 2017)
      ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ...
    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Identification, Location Tracking and Eavesdropping on Individuals by Wireless Local Area Communications 

      Andersen, Markus (Master thesis, 2019)
      Nesten alt brukerutstyr med trådløs funksjonalitet har maskinvare som har en MAC-adresse innebygd. En MAC-adresse er en unik ID, i lag to av OSI-modellen [1], for å separere brukerutstyr i lokale nettverk (LAN). En MAC-adresse ...
    • Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems 

      Akbarzadeh, Aida; Katsikas, Sokratis K. (Peer reviewed; Journal article, 2021)
      Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ...
    • Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces 

      Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2018)
      Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ...
    • Identifying keys using acoustic emanations from keystrokes 

      Nakken, Nicolai (Master thesis, 2023)
      Tidligere forskining har vist det er mulig å rekonstruere tekst skrevet på tastatur ved å analysere lyden som blir laget. Dette indikerer en stor sikkerhetstrussel, og et behov for videre forsking. I denne masteoppgaven ...
    • Identifying Malicious Python Packages: Using Static Indicators and Machine Learning 

      Røe, Simon Rødsbakken (Master thesis, 2023)
      Delingskulturen som finnes på internett og spesielt knyttet til åpen kildekode har vært viktig ved den økende interessen for teknologi. Innenfor programmering og språk slik som Python lener seg på gruppen som produserer ...
    • Identifying Proficient Cybercriminals Through Text and Network Analysis 

      Johnsen, Jan William; Franke, Katrin (Chapter, 2020)
      A few highly skilled cybercriminals run the Crime as a Service business model. These expert hackers provide entry-level criminals with tools that allow them to enhance their cybercrime operations significantly. Thus, ...
    • Identifying TLS abnormalities in Tor 

      Granerud, Anders Olaus (Master thesis, 2010)
      ENGELSK: This master thesis will examine Tor, which is an open-source anonymizing service used on the Internet. Tor gives the user an anonymous connection to the Internet in real-time. The research on Tor has been ...
    • Identitetstyveri og identitetssvindel: konsekvenser i offentlig sektor 

      Ljusic, Dejan (Master thesis, 2011)
      Identitetsstyveri er i dag en av de sterkest voksende formene for kriminalitet i verden. I USA utsettes omslag 9 millioner mennesker for ID tyveri hvert år FTC1[1]. Leif T Aanensen fra Datatilsynet[2] hevder at hver nordmann ...
    • Identity Federation for Cellular Internet of Things 

      Santos, Bernardo; Do, Thuan Van; Feng, Boning; Do, van Thanh (Chapter, 2018)
      Although the vision of 5G is to accommodate billions IoT devices and applications, its success depends very much on its ability to provide enhanced and affordable security. This paper introduces an Identity Federation ...
    • Identity Management in a Fixed Mobile convergent IMS environment 

      Nguyen, Trung Kien (Master thesis, 2008)
      Today, there are still different technologies used in fixed and mobile networks environment such as cellular technologies (GSM, UMTS, 3G, etc.), wireless network technology like WLAN, wired network technology like ADSL, ...
    • Identity Management in a Fixed-Mobile Convergent Environment 

      Lillehovde, Lars Jørgen (Master thesis, 2010)
      The unification of fixed and mobile telecommunication networks could potentially lead to new and better services for the customers and allow telecommunication operators to re-use existing network infrastructure and lower ...
    • Identity Management in M2M Networks 

      Butkus, Pranas (Master thesis, 2014)
      Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable devices and therefore amount of transmitted data. This imposes new requirements for automatic device and data management ...
    • Identity management on blockchain – privacy and security aspects 

      Panait, Andreea Elena; Olimid, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
      In the last years, identity management solutions on blockchain were proposed as a possible solution to digital identity management problems. However, they are still at an early stage, and further research needs to be done ...
    • Identity management on VANETS 

      Jemberu, Ephraim Alemneh (Master thesis, 2012)
      Vehicular ad-hoc networks (VANETs) have envisioned various applications that substantially improve traffic safety and efficiency along the roads and highways. There are on-going projects both in academia and industry to ...
    • Identity Management with Petname Systems 

      Ferdous, Md. Sadek (Master thesis, 2009)
      In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ...
    • Idol Show in China 

      Draper Gil, Gerard (Master thesis, 2006)
      Our objective is to test the performance of a real SMS Processing System. We will work with Boost Communications, a norwegian company that is developing a SMS Processing System to sell interactive SMS solutions. With our ...
    • IDSanity: a centralized and modular framework for managing IDPS and WAF rulesets 

      Ingdal, Tommy Berge; Thoresen, Halvor Mydske; Ruldolfsson, Victor (Bachelor thesis, 2015)
      In a big and complex network of IDPS and/or WAF nodes it may become time-consuming and complicated to maintain and keep control of all the different rule sets which are active at a given time. This can potentially lead to ...