• GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance 

      Gonzalez, Andres Javier; Helvik, Bjarne Emil; Tiwari, Prakriti; Denis, Becker; Wittner, Otto Jonassen (Chapter, 2015)
      The dependability of ICT systems is vital for today's society. However, operational systems are not fault free. Providers and customers have to define clear availability requirements and penalties on the delivered services ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • General TCP state inference model from passive measurements using machine learning techniques 

      Hagos, Desta Haileselassie; Engelstad, Paal E.; Yazidi, Anis; Kure, Øivind (Journal article; Peer reviewed, 2018)
      Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ...
    • A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling 

      Khodabakhsh, Ali; Busch, Christoph (Chapter, 2020)
      Photo- and video-realistic generation techniques have become a reality following the advent of deep neural networks. Consequently, there are immense concerns regarding the difficulty in differentiating what content is real ...
    • Generating historical network logs for cyber range exercises 

      Isnes, Christian Simoes (Master thesis, 2023)
      Cyberangrep blir stadig mer vanlige, og studier viser at trusler fra Advanced Persistance Threats (APT'er), øker eksponentielt. Trening av cybersikkerhetsprofesjonelle i realistiske miljøer er avgjørende for å være forberedt ...
    • Generic Metadata Time Carving 

      Porter, Kyle (Peer reviewed; Journal article, 2020)
      Recovery of files can be a challenging task in file system investigations, and most carving techniques are based on file signatures or semantics within the file. However, these carving techniques often only recover the ...
    • Generic service component development for SPICE environment 

      Gottschalk, Anne Haaland (Master thesis, 2007)
      This master thesis provides a study of the initial generic component model developed within the Service Platform for Innovative Communication Environment (SPICE) project and gives some examples of service components focusing ...
    • GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control 

      Collen, Anastasija; Nijdam, Niels Alexander; Augusto-Gonzalez, Javier; Katsikas, Sokratis; Giannoutakis, Konstantinos M.; Spathoulas, Georgios; Gelenbe, Erol; Votis, Konstantinos; Tzovaras, Dimitrios; Ghavami, Navid; Volkamer, Melanie; Haller, Piroska; Sanchez, Alvaro; Dimas, Miltiadis (Chapter, 2018)
      We present the European research project GHOST, (Safe-guarding home IoT environments with personalised real-time risk control), which challenges the traditional cyber security solutions for the IoT by proposing a novel ...
    • GIF Image Retrieval in Cloud Computing Environment 

      Reyes, Evelyn Lissete Paiz; de Lima, Nadile Nunes; Yildirim, Sule (Journal article; Peer reviewed, 2018)
      GIF images have been used in the last years, especially on social media. Here it is explored a content-based image retrieval system to work specifically with GIF file format. Its implementation is extended to a cloud ...
    • Giving the Police a Head Start: Norwegian Named Entity Recognition Dataset and Model Development for Investigative Purposes 

      Ørke, Anne Mosvold (Master thesis, 2023)
      Nesten alle eier digitale enheter og digitale bevis har blitt en viktig del av etterfor- skninger. Den store mengden med digitale enheter og bevis som må undersøkes fører til et etterslep, som igjen kan føre til forsinkelser ...
    • Go Phish! - Educating Users Not to Bite on Phishing 

      Einangen, Audun (Master thesis, 2021)
      I dagens samfunn hvor vi hele tiden blir bombardert med informasjon fra alle kanter, finnes det noen som prøver å utnytte dette, og sniker harmløst utseende eposter som kan lage kaos inn sammen med den normale strømmen av ...
    • God praksis for måling av informasjonssikkerhetsnivå 

      Bakås, Tone Hoddø (Master thesis, 2005)
      NORSK: Rapporten søker å avdekke parametere som påvirker hva som er god praksis for måling av informasjonssikkerhetsnivå i virksomheter, som antas «å være ledende» innen informasjonssikkerhet. For å finne ut hvordan ...
    • Government cloud computing: requirements, specification and design of a cloud-computing environment for police and law enforcement 

      Tellefsen, Andreas (Master thesis, 2012)
      ENGELSK: As the amount of information found at digital forensic crime scenes increases each year, conventional methods for evidence handling and analysis come under pressure to perform at a sufficient level. New techniques ...
    • GPU Accelerated NIDS Search 

      Nordhaug, Kristian (Master thesis, 2012)
      ENGELSK: Network Intrusion Detection System (NIDS) analyzes network traffic for malicious activities and report’s findings from events that intend to compromise the security of the computers and other equipment. NIDS ...
    • GRANCONF: GRAphical Network CONFiguratione 

      Olstad, Thomas Sørgård; Torgersen, Magnus Omland (Bachelor thesis, 2016-08-25)
      GRANCONF is a framework for mass configuration of network equipment and related systems in a lab environment. The framework is built for complex networking scenarios with equipment from different vendors. The framework has ...
    • Graph neural network-based virtual network function deployment optimization 

      Kim, Heegon; Park, Suhyun; Lange, Stanislav; Lee, Do-Young; Heo, Dongnyeong; Choi, Heeyoul; Yoo, Jae-Hyoung; Hong, James W. (Peer reviewed; Journal article, 2021)
      Software-defined networking (SDN) and network function virtualization (NFV) help reduce the operating expenditure (OPEX) and capital expenditure (CAPEX) as well as increase the network flexibility and agility. However, ...
    • Graph Representation of DNS-related Data for Detecting Malicious Actions 

      Rismyhr, Eirik (Master thesis, 2020)
      Skadevare er et økende problem innen cybersikkerhet. Forskning viser at en stor andel av skadevaren benytter seg av DNS-protokollen for å utføre ondsinnede handlinger. Da DNS-protokollen først ble utviklet var ikke sikkerhet ...
    • Graph theoretical approach to sexual predator detection 

      Matteini Palmerini, Riccardo (Master thesis, 2021)
      Med teknologispredningen er vi i stand til å komme i kontakt med venner langt unna så vel som ukjente personer. Bak skjermer kan personer med onde hensikter skjule identiteten deres og handle i frihet. Overgripere tar ...
    • A Greener Experience: Trade-Offs between QoE and CO<inf>2</inf> Emissions in Today's and 6G Networks 

      Hossfeld, Tobias; Varela, Martin; Skorin-Kapov, Lea; Heegaard, Poul Einar (Peer reviewed; Journal article, 2023)
      While users of Internet multimedia services demand high Quality of Experience (QoE), meeting these demands results in energy consumption along the service delivery path, from the end user's device, through the network to ...
    • Group Identification at Border Crossing Points 

      Yayilgan, Sule Yildirim; Hovstø, Asbjørn; Alaya Cheikh, Faouzi; Amodei, Anthony; Iori, Marc; Zaharia, Sandel; Ioannidis, Dimos; Thorvaldsen, Øystein Espelid (Chapter; Peer reviewed, 2011)
      Increasing Passenger flow at Border Crossing Points is an important issue at today’s border crossing points (BCPs) of land, sea and airport. Group Access Control and utilizing biometrics information will help increase ...