• Adaptive Routing in InfiniBand Hardware 

      Rocher-González, José; Gran, Ernst Gunnar; Reinemo, Sven- Arne; Skeie, Tor; Escudero-Sahuquillo, Jesús; Garcia, Pedro J.; Flor, Francisco J. Quiles (Chapter, 2022)
      Interconnection networks are the communication backbone of modern high-performance computing systems and an optimised interconnection network is crucial for the performance and utilisation of the system as a whole. One ...
    • Adaptive, Correlation-Based Training Data Selection for IoT Device Management 

      Bråten, Anders Eivind; Kraemer, Frank Alexander; Palma, David (Chapter, 2019)
      Device management can enhance large-scale deployments of IoT nodes in non-stationary environments by supporting prediction and planning of their energy budget. This increases their ability for perpetual operation and is a ...
    • Adoption of cybersecurity innovations – a systematic literature review 

      Vestad, Arnstein; Yang, Bian (Chapter, 2024)
      Adoption of cybersecurity capabilities in an organization can be seen as examples of adoption of technological innovations. While regulators use rules, standards and codes of practice to influence the state of cybersecurity ...
    • Age-Inclusive Design of Video Streaming Services: Integrating Insights and Design Implications 

      Subramanian, Sruti; de Moor, Katrien Rachel W (Chapter, 2023-11)
      With the rapid growth of video streaming services, understanding user needs, preferences, and behaviors has become crucial. However, older adults, are a significant yet often overlooked user segment, have received limited ...
    • All in a day's work: Password cracking for the rest of us 

      Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
      The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
    • An Approach to Detect Anomalous Degradation in Signal Strength of IEEE 802.15.4 Links 

      Fu, Songwei; Zhang, Yan; Jiang, Yuming; Shih, Chia-Yen; Huan, Xintao; Marron, Pedro Jose (Chapter, 2018)
      Accurate detection of the channel quality degradation is crucial for applying effective remedial actions to ensure the reliability of IEEE 802.15.4 links. Without knowing the channel quality is degraded, remedial actions ...
    • An Empirical Research on InfoSec Risk Management in IoT-based eHealth 

      Aman, Waqas; Snekkenes, Einar (Chapter, 2013)
      Enabling the healthcare infrastructure with Internet of Things (IoT) will significantly improve quality of service, reduce the costs and efficiently manage remote and mobile patients. To be efficacious, IoT and eHealth ...
    • An Empirical Study of Root-Cause Analysis in Information Security Management 

      Wangen, Gaute; Hellesen, Niclas; Torres, Henrik; Brækken, Erlend (Chapter, 2017)
      This paper studies the application of Root-cause analysis (RCA) methodology to a complex socio-technical information security (InfoSec) management problem. InfoSec risk assessment (ISRA) is the common approach for dealing ...
    • An Empirical Study of Security Culture in Open Source Software Communities 

      Wen, Shao-Fang; Kianpour, Mazaher; Kowalski, Stewart James (Chapter, 2019)
      Open source software (OSS) is a core part of virtually all software applications today. Due to the rapidly growing impact of OSS on society and the economy, the security aspect has attracted researchers' attention to ...
    • An Empirical Study of Software Reliability in SDN Controllers 

      Vizarreta, Petra; Trivedi, Kishor; Helvik, Bjarne Emil; Heegaard, Poul Einar; Kellerer, Wolfgang; Mas Machuca, Carmen (Chapter, 2017)
      Software Defined Networking (SDN) exposes critical networking decisions, such as traffic routing or enforcement of the critical security policies, to a software entity known as the SDN controller. Controller software, as ...
    • An Experimental Platform for QoE Studies of WebRTC-based Multi-Party Video Communication 

      Ammar, Doreid; De Moor, Katrien; Heegaard, Poul Einar (Chapter, 2017)
      Web Real-Time Communication (WebRTC) enables easy to use, no installation, in browser applications such as Google hangout and appear.in. To increase the understanding of the Quality of Experience with the use of such ...
    • An initial insight into Information Security Risk Assessment practices 

      Wangen, Gaute (Chapter, 2016)
      Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, where the question of how practitioners view predominant issues is an essential element often left unexplored. ...
    • An LQI-Based Packet Loss Rate Model for IEEE 802.15.4 Links 

      Zhang, Yan; Fu, Songwei; Jiang, Yuming; Ceriotti, Matteo; Packeiser, Markus; Marron, Pedro Jose (Chapter, 2018)
      Packet loss rate (PLR) is a crucial and popular link quality metric for wireless sensor networks (WSNs). In this paper, we investigate how to estimate PLR of an IEEE 802.15.4 link from the information that is easily obtained ...
    • Analysis and Visualization of Urban Emission Measurements in Smart Cities 

      Ahlers, Dirk; Kraemer, Frank Alexander; Bråten, Anders Eivind; Liu, Xiufeng; Anthonisen, Fredrik Valde; Driscoll, Patrick Arthur; Krogstie, John (Chapter, 2018)
      Cities worldwide aim to reduce their greenhouse gas emissions and improve air quality for their citizens. Therefore, there is a need to implement smart city approaches to monitor, model, and understand local emissions to ...
    • An Analysis of Design Parameters for Energy Management of Wireless Sensor Devices 

      Espe, Asbjørn Engmark; Andersen, Sondre Ninive; Salvo Rossi, Pierluigi; Kræmer, Frank Alexander; Mathisen, Geir (Chapter, 2022)
    • An Analysis of Transaction Handling in Bitcoin 

      Gebraselase, Befekadu Gezaheng; Helvik, Bjarne Emil; Jiang, Yuming (Chapter, 2021)
      Bitcoin has become the leading cryptocurrency system, but the limit on its transaction processing capacity has resulted in increased transaction fee and delayed transaction confirmation. As such, it is pertinent to understand ...
    • Analyzing Digital Evidence Using Parallel k-means with Triangle Inequality on Spark 

      Chitrakar, Ambika Shrestha; Petrovic, Slobodan (Chapter; Peer reviewed, 2018)
      Analyzing digital evidence has become a big data problem, which requires faster methods to handle them on a scalable framework. Standard k-means clustering algorithm is widely used in analyzing digital evidence. However, ...
    • As strong as the weakest link: Handling compromised components in OpenStack 

      Taheri Monfared, Aryan; JAATUN, Martin Gilje (Chapter, 2011)
      This paper presents an approach to handle compromised components in an Infrastructure-as-a-Service Cloud Computing platform. Our experiments show that traditional incident handling procedures are applicable for cloud ...
    • Assessing the risk of violating SLA dependability requirements in software-defined networks 

      Kamisiński, Andrzej; Helvik, Bjarne Emil; Gonzalez, Andres Javier; Nencioni, Gianfranco (Chapter; Peer reviewed, 2017)
      Dependability of computer and communication networks is an important aspect of the customer-provider relationship in the telecommunication industry. Considering the increasing interest in Software-Defined Networking (SDN) ...
    • Ataraxis: A Deep Learning Approach for Hardwareless In-Vehicle Presence Detection 

      Oplenskedal, Magnus Karsten; Taherkordi, Amirhosein; Herrmann, Peter (Chapter, 2021)
      Accurately detecting the mobile contexts, in which public transport vehicles and their passengers operate, is key for future intelligent context-aware services in transportation systems. A prominent example is in-vehicle ...