• New approach to authentication - considering background and untrusted devices when taking the authentication decision 

      Haklaj, Merita (Master thesis, 2017)
      IT usage today is typified by users that use multiple devices, including smartphones, desktop PCs, laptops, tablets, etc. Thus, the need to repeatedly authenticate is raised, and even with the most basic security in place ...
    • New distribution channels for advertising through computer games and mobile devices. 

      Sivagnanasuntharam, Sivasathees (Master thesis, 2008)
      The development in advertising industry has lately gone from open advertising through few, major distribution channels to a hidden and targeting advertising integrated into everyday life. Advertisers grow increasingly ...
    • New Key-Recovery Attack on Reduced-Round AES 

      Bardeh, Navid Ghaedi; Rijmen, Vincent Stefaan (Journal article; Peer reviewed, 2022)
    • A new ski injury registration system architecture using mobile applications to enhance skiing safety 

      Yildirim, Sule; Du, Yang; Dalipi, Fisnik; Jeppesen, Jonas C. (Peer reviewed; Journal article, 2016)
      Mobile apps play an increasingly important role in healthcare institutions by enhancing the quality of healthcare services. Their role in sport injury prevention is also instrumental. In this article, we propose a system ...
    • New trends in Internet attacks: Clickjacking in detail 

      Thoresen, Torgeir Dahlqvist (Master thesis, 2009)
      While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we ...
    • News Distribucation: Channel Dynamics Revisited 

      Hagen, Magnus Hoem (Master thesis, 2006)
      Today, media companies seek to utilize a set of channels. We have taken a systems approach to these companies channels that is, the different channels interact dynamically to form a product s whole. The report deals with ...
    • Newspaper on e-paper with WiFi transfer: The newspaper of the future 

      Aune, Håkon Rørvik (Master thesis, 2008)
      An e-newspaper is the result of newspaper content adapted to electronic paper. Electronic paper is a display technology which has many favourable attributes. It is a passive display technology which means that it can have ...
    • Next Generation Human and Organizational Risk Management 

      Wang, Fenghua (Master thesis, 2014)
      ENGLISH: On a regular basis compromise of organizations as result of frauds, espionage, and hackers are presented in the news. Still, many organizations tend to underestimate or ignore human related security problems. Human ...
    • Next Generation Parental Control 

      Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
      Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
    • Next Generation Parental Control 

      Gnanasekaran, Vahiny; Hatlen, Herborg Kristiansen (Master thesis, 2022)
      Dagens foreldrekontroll hjelper foreldre med å overvåke barnas digitale bruk. Selv om barna er yngre når de mottar sin første smarttelefon, er det kun få foreldre som tar i bruk slike tjenester. Tidligere litteratur viser ...
    • The NISK 2021 Proceedings Message from the Programme Chairs 

      Mjølsnes, Stig Frode; Costache, Anamaria (Journal article; Peer reviewed, 2021)
    • No Silver Bullet: QoE Metrics, QoE Fairness, and User Diversity in the Context of QoE Management 

      Hossfelt, Tobias; Skorin-Kapov, Lea; Heegaard, Poul Einar; Varela, Martin (Chapter, 2017)
      Managing QoE is one of the most interesting direct applications of workable QoE models. Indeed, being able to predict how users perceive the quality of a service allows the service provider(s) to optimize its delivery, ...
    • Non-Asymptotic Delay Bounds for Multi-Server Systems with Synchronization Constraints 

      Fidler, Markus; Walker, Brenton; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      Parallel computing has become a standard tool with architectures such as Google MapReduce, Hadoop, and Spark being broadly used in applications such as data processing and machine learning. Common to these systems are a ...
    • Non-markovian survivability assessment model for infrastructure wireless networks 

      Xie, Lang; Heegaard, Poul Einar; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      Network design and operation of a mobile network infrastructure, especially its access points, need to consider survivability as a fundamental requirement. Quantifiable approaches to survivability analysis of such ...
    • Non-technical Sources of Errors When Handling Digital Evidence within a Criminal Investigation 

      Sunde, Nina (Master thesis, 2017)
      Digital evidence is relevant to almost every criminal case. Like other lines of evidence, they serve the purpose of establishing the indisputable facts, and they also shed light on the suspects motivation and purpose of ...
    • Non-technical Sources of Errors When Handling Digital Evidence within a Criminal Investigation 

      Sunde, Nina (Master thesis, 2017)
      Digital evidence is relevant to almost every criminal case. Like other lines of evidence, they serve the purpose of establishing the indisputable facts, and they also shed light on the suspects’ motivation and purpose of ...
    • Novel and Efficient Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz; Eskeland, Sigurd; Yang, Bian (Peer reviewed; Journal article, 2024)
      Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such ...
    • A Novel hybrid IDS based on modified NSGAII-ANN and Random Forest 

      Golrang, Anahita; Golrang, Alale; Yildirim Yayilgan, Sule; Elezaj, Ogerta (Peer reviewed; Journal article, 2020)
      Machine-learning techniques have received popularity in the intrusion-detection systems in recent years. Moreover, the quality of datasets plays a crucial role in the development of a proper machine-learning approach. ...
    • NPT Online Broadband Test Tool 

      Hansen, Lars-Petter Gunhildsberg; Østhus, Ivar Conradi (Master thesis, 2009)
      Many broadband subscribers suspect that they do not receive the data rate they are paying for. In order to verify that the broadband connection is compliant with the product purchased, subscribers can go on-line and choose ...
    • NTNU Threat Total 

      Barstad, Johannes Madsen; Henriksen, Odin Korsfur; Kjærandsen, Jonas; Stuen, Peder Andreas (Bachelor thesis, 2022)
      Threat Total er en full stack web applikasjon med et brukervennlig grensesnitt, som bruker NTNUs farger og logoer. Applikasjonens backend er en robust Golang-server med caching i Redis, som reduserer lasten på våre tredjeparts ...