• Investigation, Analysis and Implementation of Open Source Mobile Communication Software 

      Paudel, Suresh (Master thesis, 2016)
      Over the past few years, open source software has transformed the mobile communication networks. The development of VoIP technologies has enabled the migration of telco protocols and services to the IP network with help ...
    • IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications 

      Shalaginov, Andrii; Iqbal, Asif; Olegård, Johannes (Chapter, 2020)
      Entering the era of the Internet of Things, the traditional Computer Forensics is no longer as trivial as decades ago with a rather limited pool of possible computer components. It has been demonstrated recently how the ...
    • IoT Sensor Gym: Training Autonomous IoT Devices with Deep Reinforcement Learning 

      Murad, Abdulmajid Abdullah Yahya; Kraemer, Frank Alexander; Bach, Kerstin; Taylor, Gavin (Chapter, 2019)
      We describe IoT Sensor Gym, a framework to train the behavior of constrained IoT devices using deep reinforcement learning. We focus on the main architectural choices to align problems from the IoT domain with cutting-edge ...
    • IoT Vulnerability Scanning: A State of the Art 

      Amro, Ahmed Walid (Chapter, 2020)
      Our modern life becomes more and more dependent on tech-nology and services provided through an increasing number of deployed devices «Things» which are connected over networks that can sometimes be accessed remotely via ...
    • IoTective: Automated Penetration Testing for Smart Home Environments 

      Nordnes, Kevin (Master thesis, 2023)
      Den raske utbredelsen av Internet of Things (IoT) har reist betydelige bekymringer angående sikkerheten og personvernet til sammenkoblede smarte miljøer. Denne masteroppgaven presenterer IoTective, et automatisert verktøy ...
    • iPhone Acquisition Using Jailbreaking Techniques 

      Varenkamp, Peter (Master thesis, 2019)
      Abstract Varenkamp Digital devices are a part of most peoples lives today. Using digital devices leaves traces. These traces can be urgent to solve a criminal case. Knowing this, forensic work has the goal to get as much ...
    • IPv6 only national backbone 

      Rey Gallo-Alcántara, Ignacio (Master thesis, 2020)
      Antallet tilgjengelige IPv4 adresser reduseres mer og mer, mens antall enheter som krever en internett-tilkobling har økt de siste årene, og det er forventet å øke videre grunnet Internet of Things (IoT). Bruken av IPv6 ...
    • IPv6 Security 

      Toreid, Vetle Vidarsson Brurberg (Master thesis, 2007)
      This paper gives a brief introduction to IPv6, and continues with a discussion of the security considerations related to the implementation of the protocol. The issues described are relevant both to ISPs and campus network ...
    • Iris Recognition in Visible Wavelength: Impact and automated Detection of Glasses 

      Osorio-Roig, Daile; Drozdowski, Pawel; Rathgeb, Christian; Morales-González, Annette; Garea-Llano, Eduardo; Busch, Christoph (Chapter, 2018)
      The prevalence of visual impairment around the world is rapidly increasing, causing large numbers of people to wear glasses. Glasses are generally considered an important noise source in iris recognition; under objective ...
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Is BS 7799 worth the effort? 

      Stamland, Frank Arne (Master thesis, 2004)
      NORSK: Denne masteroppgaven fokuserer på hvorvidt organisasjoner som har sertifisert sitt styringssystem for informasjonssikkerhet etter BS 7799, oppnår en bedre evne til å forebygge, detektere og reagere på sikkerhetsbrudd ...
    • Is the quality assurance in Digital Forensic work in the Norwegian police adequate? 

      Jahren, Jørn Helge (Master thesis, 2020)
      Denne masteroppgaven er en kvalitativ studie som baserer seg på semi-strukturerte intervjuer med dataetterforskere og kriminalteknikere fra forskjellige politidistrikter i politiet i Norge. Alle de intervjuede var erfarne ...
    • Is the Session Mix-up Attack on the UMTS/LTE AKA Protocol Practical? 

      Bhusal, Ashim (Master thesis, 2013)
      Tsay and Mjølsnes [1, 2, 3] have detected a protocol-level security vulnerability in the specifications of the Authentication and Key Agreement (AKA) protocols of the GSM/UMTS/LTE family of mobile network systems. It is ...
    • Isolated Handwritten Character Recognition of Ancient Hebrew Manuscripts 

      Lumban Tobing, Tabita; Yildirim Yayilgan, Sule; George, Sony; Elgvin, Torleif (Journal article, 2022)
      Character recognition is widely considered an essential factor in preserving and digitizing historical handwritten documents. While it has shown a significant impact, the character recognition of historical handwritten ...
    • The Isolation Concept in the 5G Network Slicing 

      Gonzalez, Andres J.; Ordonez-Lucena, Jose; Helvik, Bjarne Emil; Nencioni, Gianfranco; Xie, Min; Lopez, Diego R.; Grønsund, Pål R. (Chapter, 2020)
      The fifth generation (5G) of cellular networks shall host a number of tenants and provide services tailored to meet a wide range of requirements in terms of performance, dependability and security. Network slicing will be ...
    • It is about time–Do exFAT implementations handle timestamps correctly? 

      Nordvik, Rune; Axelsson, Stefan (Peer reviewed; Journal article, 2022)
      Digital forensic investigations require that file metadata are interpreted correctly. In this paper we focus on the timestamps of the exFAT file system. How these timestamps are written may depend on the implementation of ...
    • IT Risk Assessment Automation in Healthcare Networks 

      del Riego San Martín, Daniel (Master thesis, 2022)
      Cybersecurity has become a hot topic lately because of its importance in almost every industry. However, it has not been given the same relevancy everywhere and healthcare is an example. Millions of new devices have been ...
    • IT-sikkerhetsberedskapsøvelser i smartgrids 

      Graffer, Ingrid (Master thesis, 2015)
      Overgangen fra tradisjonelt strømnett til smartgrids introduserer teknologi som gjør at både kunder og produsenter kan bruke og generere strøm på en mer effektiv måte. Fordelene ved smartgrids er mange, men det fører også ...
    • ITS using LEGO Mindstorm 

      Overskeid, Kristian M (Master thesis, 2015)
      Intelligent Transport Systems (ITS) is a general term for information-and commuication systems aimed at making the transport sector more safe, efficient and environmentally friendly. During the recent years, cars have been ...