Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1027-1046 av 2522
-
GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance
(Chapter, 2015)The dependability of ICT systems is vital for today's society. However, operational systems are not fault free. Providers and customers have to define clear availability requirements and penalties on the delivered services ... -
Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course
(Peer reviewed; Journal article, 2021)Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ... -
General TCP state inference model from passive measurements using machine learning techniques
(Journal article; Peer reviewed, 2018)Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as a transport protocol due to practical considerations. There are many different TCP variants widely in use, and each variant ... -
A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
(Chapter, 2020)Photo- and video-realistic generation techniques have become a reality following the advent of deep neural networks. Consequently, there are immense concerns regarding the difficulty in differentiating what content is real ... -
Generating historical network logs for cyber range exercises
(Master thesis, 2023)Cyberangrep blir stadig mer vanlige, og studier viser at trusler fra Advanced Persistance Threats (APT'er), øker eksponentielt. Trening av cybersikkerhetsprofesjonelle i realistiske miljøer er avgjørende for å være forberedt ... -
Generic Metadata Time Carving
(Peer reviewed; Journal article, 2020)Recovery of files can be a challenging task in file system investigations, and most carving techniques are based on file signatures or semantics within the file. However, these carving techniques often only recover the ... -
Generic service component development for SPICE environment
(Master thesis, 2007)This master thesis provides a study of the initial generic component model developed within the Service Platform for Innovative Communication Environment (SPICE) project and gives some examples of service components focusing ... -
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control
(Chapter, 2018)We present the European research project GHOST, (Safe-guarding home IoT environments with personalised real-time risk control), which challenges the traditional cyber security solutions for the IoT by proposing a novel ... -
GIF Image Retrieval in Cloud Computing Environment
(Journal article; Peer reviewed, 2018)GIF images have been used in the last years, especially on social media. Here it is explored a content-based image retrieval system to work specifically with GIF file format. Its implementation is extended to a cloud ... -
Giving the Police a Head Start: Norwegian Named Entity Recognition Dataset and Model Development for Investigative Purposes
(Master thesis, 2023)Nesten alle eier digitale enheter og digitale bevis har blitt en viktig del av etterfor- skninger. Den store mengden med digitale enheter og bevis som må undersøkes fører til et etterslep, som igjen kan føre til forsinkelser ... -
Go Phish! - Educating Users Not to Bite on Phishing
(Master thesis, 2021)I dagens samfunn hvor vi hele tiden blir bombardert med informasjon fra alle kanter, finnes det noen som prøver å utnytte dette, og sniker harmløst utseende eposter som kan lage kaos inn sammen med den normale strømmen av ... -
God praksis for måling av informasjonssikkerhetsnivå
(Master thesis, 2005)NORSK: Rapporten søker å avdekke parametere som påvirker hva som er god praksis for måling av informasjonssikkerhetsnivå i virksomheter, som antas «å være ledende» innen informasjonssikkerhet. For å finne ut hvordan ... -
Government cloud computing: requirements, specification and design of a cloud-computing environment for police and law enforcement
(Master thesis, 2012)ENGELSK: As the amount of information found at digital forensic crime scenes increases each year, conventional methods for evidence handling and analysis come under pressure to perform at a sufficient level. New techniques ... -
GPU Accelerated NIDS Search
(Master thesis, 2012)ENGELSK: Network Intrusion Detection System (NIDS) analyzes network traffic for malicious activities and report’s findings from events that intend to compromise the security of the computers and other equipment. NIDS ... -
GRANCONF: GRAphical Network CONFiguratione
(Bachelor thesis, 2016-08-25)GRANCONF is a framework for mass configuration of network equipment and related systems in a lab environment. The framework is built for complex networking scenarios with equipment from different vendors. The framework has ... -
Graph neural network-based virtual network function deployment optimization
(Peer reviewed; Journal article, 2021)Software-defined networking (SDN) and network function virtualization (NFV) help reduce the operating expenditure (OPEX) and capital expenditure (CAPEX) as well as increase the network flexibility and agility. However, ... -
Graph Representation of DNS-related Data for Detecting Malicious Actions
(Master thesis, 2020)Skadevare er et økende problem innen cybersikkerhet. Forskning viser at en stor andel av skadevaren benytter seg av DNS-protokollen for å utføre ondsinnede handlinger. Da DNS-protokollen først ble utviklet var ikke sikkerhet ... -
Graph theoretical approach to sexual predator detection
(Master thesis, 2021)Med teknologispredningen er vi i stand til å komme i kontakt med venner langt unna så vel som ukjente personer. Bak skjermer kan personer med onde hensikter skjule identiteten deres og handle i frihet. Overgripere tar ... -
A Greener Experience: Trade-Offs between QoE and CO<inf>2</inf> Emissions in Today's and 6G Networks
(Peer reviewed; Journal article, 2023)While users of Internet multimedia services demand high Quality of Experience (QoE), meeting these demands results in energy consumption along the service delivery path, from the end user's device, through the network to ... -
Group Identification at Border Crossing Points
(Chapter; Peer reviewed, 2011)Increasing Passenger flow at Border Crossing Points is an important issue at today’s border crossing points (BCPs) of land, sea and airport. Group Access Control and utilizing biometrics information will help increase ...