Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1234-1253 av 2521
-
Investigating Business Alignment Issues Rooted in the Norwegian Specialist Health Services' Cybersecurity Culture, Through a Systems Thinking Approach
(Master thesis, 2020)Det norske helsevesenet er satt sammen av flere interagerende interessenter på forskjellige organisatoriske nivåer (nasjonalt, nasjonale profesjonelle, regionale og operasjonelle). Dette komplekse systemet blir kontinuerlig ... -
Investigating machine learning attacks on financial time series models
(Peer reviewed; Journal article, 2022)Machine learning and Artificial Intelligence (AI) already support human decision-making and complement professional roles, and are expected in the future to be sufficiently trusted to make autonomous decisions. To trust ... -
Investigating Motivational Factors Influencing Users’ Consumption of Video Streaming Services: A Human Factor Perspective
(Chapter, 2023)This paper presents comprehensive findings obtained from an online survey focused on understanding the motivational factors influencing users’ consumption of video streaming services from a human factors perspective. The ... -
Investigating QoE in a Cloud-Based Classroom Response System: A Real-Life Longitudinal and Cross-Sectional Study of Kahoot!
(Master thesis, 2014)The goal of this thesis work is to investigate the user-perceived QoE of Kahoot!, a cloud gaming learning platform, designed to be used in classrooms. The general objective of this thesis is to investigate to what extent ... -
Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study
(Peer reviewed; Journal article, 2022)HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the ... -
Investigating the use of smartphones in the context of home networks
(Master thesis, 2010)The focus in this thesis is to investigate how smartphones on the market today can be used in the context of home networks. The latest generation of these devices has powerful hardware and software which makes them useful ... -
Investigating trust relationships between software development teams and information security stakeholders
(Master thesis, 2022)Smidig utvikling har de siste tiårene fått stor oppmerksomhet i IT-industrien og forskningsmiljøet. Utviklingsmetodikken har introdusert mange fordeler for programvareleveranse, blant annet et større fokus på tverrfaglig ... -
Investigating trust relationships between software development teams and information security stakeholders
(Master thesis, 2022)Smidig utvikling har de siste tiårene fått stor oppmerksomhet i IT-industrien og forskningsmiljøet. Utviklingsmetodikken har introdusert mange fordeler for programvareleveranse, blant annet et større fokus på tverrfaglig ... -
Investigation into Phishing Risk Behaviour among Healthcare Staff
(Peer reviewed; Journal article, 2022)A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social ... -
Investigation of LTE Privacy Attacks by Exploiting the Paging Mechanism
(Master thesis, 2018)In mobile communication in general, and LTE in particular, security should be a main focus, also because of the vulnerabilities introduced by the radio link. Compared to GSM and UMTS, the LTE security has been improved. ... -
Investigation of the Gap Between Traditional IP Network Security Management and the Adoption of Automation Techniques and Technologies to Network Security
(Master thesis, 2023)Innenfor området nettverks- og nettverkssikkerhetsautomatisering avdekker denne oppgaven et komplekst landskap av utfordringer og muligheter. Forskningen som er gjennomført, belyser de intrikate elementene som er innebygd ... -
Investigation, Analysis and Implementation of Open Source Mobile Communication Software
(Master thesis, 2016)Over the past few years, open source software has transformed the mobile communication networks. The development of VoIP technologies has enabled the migration of telco protocols and services to the IP network with help ... -
IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications
(Chapter, 2020)Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the ... -
IoT Sensor Gym: Training Autonomous IoT Devices with Deep Reinforcement Learning
(Chapter, 2019)We describe IoT Sensor Gym, a framework to train the behavior of constrained IoT devices using deep reinforcement learning. We focus on the main architectural choices to align problems from the IoT domain with cutting-edge ... -
IoT Vulnerability Scanning: A State of the Art
(Chapter, 2020)Our modern life becomes more and more dependent on tech-nology and services provided through an increasing number of deployed devices «Things» which are connected over networks that can sometimes be accessed remotely via ... -
IoTective: Automated Penetration Testing for Smart Home Environments
(Master thesis, 2023)Den raske utbredelsen av Internet of Things (IoT) har reist betydelige bekymringer angående sikkerheten og personvernet til sammenkoblede smarte miljøer. Denne masteroppgaven presenterer IoTective, et automatisert verktøy ... -
iPhone Acquisition Using Jailbreaking Techniques
(Master thesis, 2019)Abstract Varenkamp Digital devices are a part of most peoples lives today. Using digital devices leaves traces. These traces can be urgent to solve a criminal case. Knowing this, forensic work has the goal to get as much ... -
IPv6 only national backbone
(Master thesis, 2020)Antallet tilgjengelige IPv4 adresser reduseres mer og mer, mens antall enheter som krever en internett-tilkobling har økt de siste årene, og det er forventet å øke videre grunnet Internet of Things (IoT). Bruken av IPv6 ... -
IPv6 Security
(Master thesis, 2007)This paper gives a brief introduction to IPv6, and continues with a discussion of the security considerations related to the implementation of the protocol. The issues described are relevant both to ISPs and campus network ... -
Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses
(Chapter, 2018)The prevalence of visual impairment around the world is rapidly increasing, causing large numbers of people to wear glasses. Glasses are generally considered an important noise source in iris recognition; under objective ...