• Holding on to Compliance While Adopting DevSecOps: An SLR 

      Ramaj, Xhesika; Sanchez Gordon, Mary Luz; Gkioulos, Vasileios; Chockalingam, Sabarathinam; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2022)
      The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ...
    • A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda 

      Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ...
    • A Holistic Approach to Dependability Modeling and Analysis of Smart Distribution Grids 

      Zerihun, Tesfaye Amare (Doctoral theses at NTNU;2021:56, Doctoral thesis, 2021)
      Lately, the distribution grid has been under a significant transformation, with a pervasive integration of Information and Communication Technology (ICT) for an enhanced operation and management of the grid. Some of the ...
    • Honey Templates: a Protection Mechanism for Biometric Systems 

      Martiri, Edlira (Doctoral theses at NTNU;2022:20, Doctoral thesis, 2022)
    • Hop-by-hop TCP communication as a network function - A proof-of-concept implementation 

      Kvamtrø, Knut Magnus (Master thesis, 2017)
      Techniques for enabling resilient network communication over less-than- optimal communication links were studied. A testbed for low-level network behavior and link characteristic emulation was created using QEMU- virtualized ...
    • How a Control Plane Policed DDoS Attack Impacts the Latency of Time-Critical Offshore IoT Traffic 

      Bruleite, Hanne Malmin (Master thesis, 2020)
      5G har nylig blitt introdusert, noe som vil gjøre det mulig å bruke tids-kritiske applikasjoner som har strenge krav til pålitelighet og forsinkelse. Applikasjoner som har slike krav er også kjent som applikasjoner som ...
    • How cyber security incidents can affect Norwegian food production 

      Kjønås, Karianne (Master thesis, 2023)
      Cybersikkerhet i landbruket blir mer og mer viktig fra et samfunnsikkerhetsperspektiv fordi matforsyningen kan være et mål for nasjonale trusler. Bruken av teknologi i landbruket har økt med årene, som fører til en økning ...
    • How Moving from Traditional Signature Analysis to Automatic Anomaly Analysis Affects User Experience and Security Awareness 

      Selte, Caroline Stensland (Master thesis, 2020)
      Tradisjonelt har sikkerhetsmonitorering vært regelbasert, men når blir det tatt i bruk maskinlæringsteknologi for å forbedre sikkerhetssystemene. E-postløsninger er blant systemene som bruker den nye teknologien. Dette er ...
    • How re-training process affect the performance of no-reference image quality metric for face images 

      Liu, Xinwei; Charrier, Christophe; Pedersen, Marius; Bours, Patrick (Journal article; Peer reviewed, 2019)
      The accuracy of face recognition systems is significantly affected by the quality of face sample images. There are many existing no-reference image quality metrics (IQMs) that are able to assess natural image quality by ...
    • How safe are children on online social platforms 

      Afzal, Hussein; Afzal, Hassen; Nimalmohan, Madhushan; Abdulle, Mohamed K Hassan (Bachelor thesis, 2021)
      Denne rapporten er en vurdering og evaluering av tryggheten til barn som er på sosiale plattformer, for denne oppgaven inkluderer det Moviestarplanet, Roblox, Snapchat og TikTok. Metoden for å gjennomføre analysen er basert ...
    • How to do it right: A framework for biometrics supported border control 

      Abomhara, Mohamed Ali Saleh; Yildirim Yayilgan, Sule; Nymoen, Anne Hilde Ruen; Shalaginova, Marina; Székely, Zoltán; Elezaj, Ogerta (Journal article; Peer reviewed, 2019)
      Complying with the European Union (EU) perspective on human rights goes or should go together with handling ethical, social and legal challenges arising due to the use of biometrics technology as border control technology. ...
    • How to make money on mobile applications 

      Tveten, Thomas Moltke-H (Master thesis, 2014)
      The number of mobile applications grows exponential fast with 1,000 new applications published each day, and 1 million already available. The competition among applications is fierce, but the applications that become popular ...
    • Human Behavior Prediction for Risk Analysis 

      Szekeres, Adam; Snekkenes, Einar Arthur (Chapter, 2021)
      The Conflicting Incentives Risk Analysis (CIRA) method makes predictions about human decisions to characterize risks within the domain of information security. Since traditional behavior prediction approaches utilizing ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Human Motivation as the Basis of Information Security Risk Analysis 

      Szekeres, Adam (Doctoral theses at NTNU;2020:373, Doctoral thesis, 2020)
      The electric grid represents a critical infrastructure which has an essential rolein supporting societies. Therefore, it is important to identify, analyse and mitigate undesirable events that may disrupt the reliable ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Human-Robot Collaboration: Safety by Design 

      Degeorges, Théo; Sziebig, Gabor (Journal article, 2021)
      High payload industrial robots, unlike collaborative robots are not designed to work together with humans. Collaboration can only happen in situations, where the human and robot is separated with a distance, which allows ...
    • Hunting malicious scripts using machine learning 

      Brevig, Torstein (Master thesis, 2020)
      Siden datamaskiner er i bruk overalt i samfunnet, har ondsinnet programvare (skadevare) vokst til en stor trussel. For eksempel har bruken av ransomware økt de siste årene. En måte å spre slik skadevare på er ved bruk av ...
    • Hunting malicious scripts using machine learning 

      Lien, Tormod Haus (Master thesis, 2021)
      Datasystemer har blitt mer og mer avgjørende for samfunnet vårt, noe som betyr at disse systemene har blitt mer verdifulle enn noen gang før, og er derfor utsatt for interaksjoner fra personer med ondsinnede hensikter. Det ...
    • Hybrid analysis for Android malware family classification in a time-aware setting 

      Fauskrud, Joakim (Master thesis, 2019)
      Flere millioner ondsinnede Android applikasjoner (skadevare) detekteres hvert år. Disse applikasjonene skjuler seg i Android-markedsplasser ved utgi seg for å være godsinnede applikasjoner. Når en bruker installerer ...