• MAC layer security services in IEEE 802.15.4 

      Solheim, Sindre Elias (Master thesis, 2018)
      The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard describes the Medium Access Control (MAC) sub-layer and Physical layer of the Open Systems Interconnection (OSI) model of low-rate wireless ...
    • Machine Learning Aided Static Malware Analysis: A Survey and Tutorial 

      Shalaginov, Andrii; Banin, Sergii; Dehghantanha, Ali; Franke, Katrin (Chapter, 2018)
      Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections. The fast growth ...
    • Machine Learning for Multi-Source Analysis 

      Telstad, Emil; Sannes, Mats Ove (Master thesis, 2021)
      Internett fortsetter å utvide seg, og brukere forventer stadig bedre ytelse ettersom nye og bedre digitale tjenester blir tilgjengelig. Internettleverandører overvåker nettverksinfrastrukturen sin nøye for å opprettholde ...
    • Machine Learning for Multi-Source Analysis 

      Telstad, Emil; Ove Sannes, Mats (Master thesis, 2021)
      Internett fortsetter å utvide seg, og brukere forventer stadig bedre ytelse ettersom nye og bedre digitale tjenester blir tilgjengelig. Internettleverandører overvåker nettverksinfrastrukturen sin nøye for å opprettholde ...
    • Machine Learning-based Occupancy Estimation Using Multivariate Sensor Nodes 

      Singh, Adarsh Pal; Jain, Vivek; Chaudhari, Sachin; Kraemer, Frank Alexander; Werner, Stefan; Garg, Vishal (Chapter, 2019)
      In buildings, a large chunk of energy is spent on heating, ventilation and air conditioning systems. One way to optimize their usage is to make them demand-driven depending on human occupancy. This paper focuses on accurately ...
    • Machine Learning-based Uptime-Prediction for Battery-friendly Passenger Information Displays 

      Herrmann, Peter; Puka, Ergys; Skoglund, Tor Rune (Chapter, 2020)
      Personal Information Displays (PID) at bus stops help making the usage of public transport more attractive. If no electric grid is nearby, however, the installation of PIDs is very expensive due to the high wiring costs. ...
    • Malware Analysis; Frameworks and Tools for Automated Dynamic Analysis of Malware 

      Eriksson, Thomas (Master thesis, 2009)
      This thesis describes different automated dynamic malware analysis solutions and their underlying technologies. A good deal of prerequisite concepts has to be covered before the actual solutions are studied. Some of these ...
    • Malware Analysis;: A Systematic Approach 

      Wedum, Petter Langeland (Master thesis, 2008)
      An almost incomprehensible amount of data and information is stored on millions and millions of computers worldwide. The computers, interconnected in local, national and international networks, use and share a high number ...
    • Malware detection and classification using low-level features 

      Banin, Sergii (Doctoral theses at NTNU;2023:11, Doctoral thesis, 2023)
      Nowadays, computers and computer systems are involved in most areas of our lives. Employees and users of manufacturing and transportation, banking and healthcare, education, and entertainment rely on computers and networks ...
    • Malware Detection Through Call Graphs 

      Kinable, Joris (Master thesis, 2010)
      Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ...
    • Malware detection through opcode sequence analysis using machine learning 

      Bragen, Simen Rune (Master thesis, 2015)
      To identify malware, most antivirus scanners use a combination of signature matching and heuristic-based detection. Signature matching compares only to previously known files, while heuristic-based detection looks for known ...
    • Managed access dependability for critical services in wireless inter domain environment 

      Følstad, Eirik Larsen (Doctoral thesis at NTNU;2016:66, Doctoral thesis, 2016)
      The Information and Communications Technology (ICT) industry has through the last decades changed and still continues to affect the way people interact with each other and how they access and share information, services ...
    • Managed Dependability in Interacting Systems 

      Helvik, Bjarne Emil; Nencioni, Gianfranco; Heegaard, Poul Einar; Wäfler, Jonas (Springer Series in Reliability Engineering;, Chapter; Peer reviewed, 2016)
      AdigitalICTinfrastructuremustbeconsideredasasystemofsystemsin itself, but also in interaction with other critical infrastructures such as water distributions, transportation (e.g. Intelligent Transport Systems) and Smart ...
    • Management of Large Scale NetFlow Data by Distributed Systems 

      Tian, Zehua (Master thesis, 2016)
      Nowadays, as network has almost permeated all aspects of people s life, network quality and security administration becomes very necessary. A very important part is monitoring and analyzing network traffic. NetFlow is an ...
    • Managing Cyber Security Risks of the Cyber-Enabled Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis (Peer reviewed; Journal article, 2020)
      One aspect of the digital transformation process in the shipping industry, a process often referred to as Shipping 4.0, is the increased digitization of on board systems that goes along with increased automation in and ...
    • Managing private credentials by privacy-preserving biometrics 

      Yang, Bian; Li, Guoqiang (Journal article; Peer reviewed, 2018)
      We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ...
    • Managing Security Trade-offs in the Internet of Things using Adaptive Security 

      Aman, Waqas; Snekkenes, Einar (Chapter, 2015)
      Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these ...
    • Managing signatures for IDS in a distributed environment: a study of a signature management system 

      Henriksen, David Ormbakken (Master thesis, 2012)
      ENGELSK: There has been a 36 percent increase in detected computer attacks from 2010 to 2011 according to the latest Symantec threat report. An increase in the total number of attacks from the previous year to the next ...
    • Managing Software Security Knowledge in Context: An Ontology Based Approach 

      Wen, Shao-Fang; Katt, Basel (Journal article; Peer reviewed, 2019)
      Knowledge of software security is highly complex since it is quite context-specific and can be applied in diverse ways. To secure software development, software developers require not only knowledge about general security ...
    • Managing the development of secure electronic banking 

      Nilsen, Tom (Master thesis, 2006)
      NORSK: Dette MSc prosjektet er en oppgave fra en bank. Sikkerhet har alltid vært viktig for banker. Med Nettbank har det blitt ennå viktigere etter som Internet kan overstige filial og kontornettets viktighet som ...