Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1387-1406 av 2525
-
Medical students' perceptions of a blockchain-based decentralized work history and credentials portfolio: Qualitative feasibility study
(Peer reviewed; Journal article, 2021)Background: Increased digitization of health care might challenge some of the trust functions that are established in a traditional health care system. We have, with the concept of VerifyMed, developed a decentralized ... -
Memory access patterns for malware detection
(Journal article; Peer reviewed, 2016)Malware brings significant threats to modern digitized society. Malware developers put in significant efforts to evade detection and remain unnoticed on victims' computers despite a number of malware detection techniques. ... -
Message Forwarding between Vehicles in Dead Spots - English
(Master thesis, 2018)The project for this master thesis aimed to study the concept of vehicle-to-vehicle communication in places with no or little Internet connection, so called dead spots. Collecting traffic information along the road is ... -
Message Prioritization In Bluetooth Mesh Networks
(Master thesis, 2023)Bluetooth mesh er en lovende ny teknologi med applikasjoner i den industrielle IoT-sektoren. Den tillater pålitelig og skalerbar kommunikasjon som ikke krever noen sentral kontroller. Denne oppgaven utvikler to metoder ... -
Metaheuristic Based Scheduling Meta-Tasks in Distributed Heterogeneous Computing Systems
(Journal article; Peer reviewed, 2009)Scheduling is a key problem in distributed heterogeneous computing systems in order to benefit from the large computing capacity of such systems and is an NP-complete problem. In this paper, we present a metaheuristic ... -
Metallization scheme and release methods for fabrication of RF MEMS switches
(Chapter; Peer reviewed, 2007) -
A Metamodel for Web Application Security Evaluation
(Chapter, 2023)In the digital era, web applications have become a prevalent tool for businesses. As the number of web applications continues to grow, they become enticing targets for malicious actors seeking to exploit potential security ... -
Method for evaluating authentication system quality
(Master thesis, 2007)NORSK: Autentiseringssystemer skal bekrefte at man er den man påstår man er, samt sikre at kun personer med rettmessig tilgang får aksess. Det finnes mange måter å autentisere seg på ovenfor et system. Felles for alle ... -
A Method for Performability Study on Wide Area Communication Architectures for Smart Grid
(Chapter, 2019)An extensive use of ICT is a key feature in the development of next generation smart grids. The ability of the ICT system to meet the real time requirements of the powers system, even when it is degraded due to failures, ... -
Method for subjective assessment of immersion in audiovisual experiences
(Journal article; Peer reviewed, 2021)Studying immersion in audiovisual experiences can help technologists deliver engaging and enhanced experiences. As a first step toward this goal this paper details an investigation conducted to establish an experimental ... -
A Methodology for Measuring Information Security Maturity in Norwegian and Indian MSME’s with special focus on people factor
(Master thesis, 2010)Information Security with focus on people factor has become a major focus area for all sizes of organizations globally. Because people are those in these organizations who maintain the technology, maintain the day-to-day ... -
Methods for Enhancement of Timestamp Evidence in Digital Investigations
(Doktoravhandlinger ved NTNU, 1503-8181; 2008:19, Doctoral thesis, 2008)This work explores how the evidential value of digital timestamps can be enhanced by taking a hypothesis based approach to the investigation of digital timestamps. It defines the concepts of clock hypotheses, timestamps ... -
Methods For Guaranteeing Contracted Availability In Connection Oriented Networks
(Doctoral Theses at NTNU, 1503-8181; 2013:102, Doctoral thesis, 2013)Real telecommunications networks are not failure free. Any single disconnection impacts the network provider reputation and finances, and produces incalculable consequences to the customers through the affected applications. ... -
Methods Used in Cyberattacks in the War Between Russia & Ukraine
(Bachelor thesis, 2023)I denne bachelor-oppgaven har gruppen tatt for seg hvilke metoder som har blitt brukt til cyberkrigføring i Russland-Ukraina krigen som har pågått siden 24. Februar 2022. Omfanget til oppgaven var ett år, fra 1. Februar ... -
Metrics for Measuring Security in Peer-to-Peer Software
(Master thesis, 2005)NORSK: Vi ser i dag en økt bruk av Peer-to-Peer (heretter: P2P) teknologier, denne økningen gjelder både i private og kommersielle settinger. Denne nye teknologien kommer i mange ulike former og kan strekke seg fra ... -
Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications
(Chapter, 2020)The emergence of Internet of Things (IoT) applications presents a wide range of opportunities in areas such as automotive, consumer, energy, smart city and many others. Since many of these systems operate in environments ... -
Military application of 5G
(Master thesis, 2023)Det gjøres store fremskritt innen mobilkommunikasjon og det tas stadig nye steg. Med 5G så tilgjengeliggjør det et nettverk med lav forsinkelse, muligheten til å koble til mange brukere og tilgang til høy båndbredde. ... -
Military Autonomous 5G-Based Systems: Using PUF for Hardware Authentication to IoT SAFE SIM
(Master thesis, 2023)Økende bruk av autonome systemer har vakt interesse hos de norske væpnede styrkene. For å lette dette, samt deres egen interne kommunikasjon i tilfelle av en internett-nedetid, har de sett på 5G som en støtteteknologi. Et ... -
Mind the Gap - An Exploratory Study of Commercial and Military Computer Security Incident Response Teams (CSIRTs) - Are Incident Response (IR) and Computer Security Incident Response Teams (CSIRTs) Forensic ready in the information domain?
(Master thesis, 2017)The challenges related to overwhelming amounts of data and information are emerging in the cybersecurity profession. Operators and decision makers need to process vast amounts of information to get the best basis possible ... -
Minimizing Delay and Packet Delay Variation in Switched 5G Transport Networks
(Peer reviewed; Journal article, 2019)A key requirement in 5G networks is the demand of minimizing transport delay. In this paper we propose and explore novel mechanisms for minimizing packet delay and delay variation in 5G mobile transport networks. Different ...