• Labelling clusters in an anomaly based IDS by means of clustering quality indexes 

      Storløkken, Roger (Master thesis, 2007)
      NORSK: Innbruddsdeteksjonssystemer har i de siste årene blitt en viktig komponent i løsninger for nettverkssikkerhet. Disse systemene bruker enten signaturbaserte eller anormalitetsbaserte teknikker for å detektere ...
    • Languages of higher-dimensional automata 

      Fahrenberg, Uli; Johansen, Christian; Struth, Georg; Ziemiański, Krzysztof (Journal article; Peer reviewed, 2021)
      We introduce languages of higher-dimensional automata (HDAs) and develop some of their properties. To this end, we define a new category of precubical sets, uniquely naturally isomorphic to the standard one, and introduce ...
    • Launching an Innovative Mobile Multimedia Communication Application: using different platforms 

      Gunnerud, Runar (Master thesis, 2007)
      The IP Multimedia Subsystem (IMS) is intended by the Telco industry, to make it easy for third-party application developers to create new, innovative services that will help to offset the fall in revenue of regular voice ...
    • Layout Dependent Phenomena A New Side-channel Power Model 

      Dyrkolbotn, Geir Olav; Wold, Knut; Snekkenes, Einar (Journal article; Peer reviewed, 2012)
      The energy dissipation associated with switching in CMOS logic gates can be used to classify the microprocessor’s activity. In VLSI design, layout dependent phenomena, such as capacitive crosstalk, become a major ...
    • Learning Modeling Languages Using Strategies from Gaming 

      Richardsen, Øyvin (Master thesis, 2014)
      Learning about software modeling languages from documentation can be a difficultand confusing process, and many of the currently existing modeling language tutorialsare only marginally better. At the same time, players of ...
    • Learning Modeling Languages Using Strategies from Gaming 

      Richardsen, Øyvin (Master thesis, 2014)
      Learning about software modeling languages from documentation can be a difficult and confusing process, and many of the currently existing modeling language tutorials are only marginally better. At the same time, players ...
    • Learning Secure Programming in Open Source Software Communities: A Socio-Technical View 

      Wen, Shao-Fang (Chapter, 2018)
      In open source software (OSS) communities, volunteers collaborate and integrate expertise to develop the software online via the Internet in a decentralized, highly interactive and knowledge-intensive process. Development ...
    • Learning Software Security in Context: An Evaluation in Open Source Software Development Environment 

      Wen, Shao-Fang; Katt, Basel (Chapter, 2019)
      Learning software security has become a complex and difficult task today than it was even a decade ago. With the increased complexity of computer systems and a variety of applications, it is hard for software developers ...
    • Legal and technical questions of file system reverse engineering 

      Stoykova, Radina; Nordvik, Rune; Ahmed, Munnazzar; Franke, Katrin; Axelsson, Stefan; Toolan, Fergus (Peer reviewed; Journal article, 2022)
      Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition, and correct interpretation of data structures by law enforcement in criminal investigations. This position paper examines ...
    • Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection 

      Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber ...
    • Legal requirements toward enhancing the security of medical devices 

      Yeng, Prosper; Yang, Bian; Wolthusen, Stephen D. (Peer reviewed; Journal article, 2020)
      Over 25 million Americans are dependent on medical devices. However, the patients who need these devices only have two choices, thus the choice between using an insecure critical-life-functioning devices or the choice to ...
    • Leger og sykepleieres prioritering i kommunikasjonssammenheng på sengepost 

      Holmelid Myhr, Kristina (Master thesis, 2008)
      I et samfunn der det stadig legges mer press på effektivisering i arbeidsforhold er offentlig sektor og sykehus på ingen måte noe unntak. Den siste tiden har man kunnet lese om store nedskjæringer i budsjettet til ...
    • Leverage efficiency with optimised information security communication 

      Sveen, Kjetil (Master thesis, 2016-08-31)
      Information security is a multidisciplinary area of study and professional activity. It comprises technical, organisational, human and legal issues, and requires thus cooperation between professionals and individuals with ...
    • Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid. 

      Nygård, Arne Roar; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
      Cyber-attacks on digital supply chains are rising, and Critical Infrastructures (CIs) such as the Smart Grid are prime targets. There is increasing evidence that vendors, service providers, and outsourced IT -providers are ...
    • Leveraging Machine Learning for Effective DDoS Detection and Mitigation in Software-Defined Networks 

      Sunde, Oliver Halvorseth (Master thesis, 2023)
      Distribuerte tjenestenekt-angrep (DDoS) utgjør en betydelig trussel mot nettverkssikkerhet. Denne forskningen har som mål å forbedre deteksjon og mitigasjon av DDoS i programvaredefinerte nettverk ved hjelp av hyperparam ...
    • Leveraging Open-Source Intelligence for Enhanced Cyber Threat Intelligence in Norwegian SMBs: A Legal, Practical, and Ethical Analysis 

      Aarvaag, Jo K.; Nordli, Matias; Roaas, Alexander P.; Simonsen, Frederik (Bachelor thesis, 2023)
      Små- og mellomstore bedrifter (SMB-er) er vanligvis mer sårbare for cybertrusler enn større bedrifter, grunnet deres begrensede økonomiske ressurser til å kunne investere i sikkerhetstjenester. Det er i dag et uutnyttet ...
    • Leveraging The USB Power Delivery Implementation For Digital Forensic Acquisition 

      Alendal, Gunnar; Axelsson, Stefan; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2021)
      Modern consumer devices present major challenges in digital forensic investigations due to security mechanisms that protect user data. The entire physical attack surface of a seized device such as a mobile phone must be ...
    • Lex-pos feature-based grammar error detection system for the English language 

      Agarwal, Nancy; Wani, Mudasir Ahmad; Bours, Patrick (Peer reviewed; Journal article, 2020)
      This work focuses on designing a grammar detection system that understands both structural and contextual information of sentences for validating whether the English sentences are grammatically correct. Most existing systems ...
    • Libellus: Crisis Management Tool 

      Solstad, Daniel André; Rasch, Ole Johan (Bachelor thesis, 2014)
      NORSK: Libellus er et journalføringsprogram for kriser og krisehåndteringsopplæring. Programmet er nytenkende på området infrastrukturtilknytning, ved at det kun krever en datamaskin for å kunne tilby all basisfunksjonalitet ...
    • Light fields for face analysis 

      Galdi, Chiara; Chiesa, Valeria; Busch, Christoph; Correia, Paulo Lobato; Dugelay, Jean-Luc; Guillemot, Christine (Peer reviewed; Journal article, 2019)
      The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ...