• Survival by Deception 

      Jaatun, Martin Gilje; Nyre, Åsmund Ahlmann; Sørensen, Jan Tore (Journal article; Peer reviewed, 2007)
      A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. ...
    • Sustainable Smart House Technology Business Models: An Assessment of Rebound Effects 

      Rød-Knudsen, Line (Master thesis, 2010)
      Smart House Technologies have in earlier research been put forward as an effective measure to reduce CO2-emissions. A rebound effect is defined as the change in energy demand caused by changes in consumer behavior. This ...
    • Swarm Routing in Information Centric Networks 

      Descamps Vilà, Adrià (Master thesis, 2019)
      The current Internet usage is changing, with an important increase in the consumption of content-based applications. However, the current host-based architecture is not prepared to integrate this amount of information. ...
    • Sykepleieres bruk og ikke-bruk av pasientsignalsystemet ved St. Olavs Hospital: En sosioteknisk tilnærming. 

      Sund, Veronica; Hafredal, Monika Grimstad (Master thesis, 2014)
      Ved utbyggingen av nye St. Olavs Hospital i Trondheim, ble den leverte IKT-løsningen betegnet som Norges dyreste og mest kompliserte IKT-prosjekt. Infrastrukturen som ble implementert inneholder blant annet et fast og et ...
    • Symmetric Key Exchange with Full Forward Security and Robust Synchronization 

      Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (Peer reviewed; Journal article, 2021)
      We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous ...
    • Synthesizing Components with Sessions from Collaboration-Oriented Service Specifications 

      Kraemer, Frank Alexander; Bræk, Rolv; Herrmann, Peter Michael (Journal article; Peer reviewed, 2007)
      A fundamental problem in the area of service engineering is the so-called cross-cutting nature of services, i.e., that service behavior results from a collaboration of partial component behaviors. We present an approach ...
    • System dynamic market models for mobile services 

      Skuggedal, Kristoffer (Master thesis, 2016)
      The mobile service market has gone through a major change in the last several years. The market has evolved from a traditional monopolistic situation to a situation with a variety of different service providers. The ...
    • System for integration of tools for full content verification on multiple sensors 

      Steensnæs, Tommy (Master thesis, 2010)
      ENGELSK: Cyberspace is the newest addition to the domains for warfare. As in the other domains both offensive and defensive operations are relevant. Defensive operations in cyberspace can draw on experience from traditional ...
    • System security assurance: A systematic literature review 

      Shukla, Ankur; Katt, Basel; Nweke, Livinus Obiora; Yeng, Prosper; Weldehawaryat, Goitom Kahsay (Peer reviewed; Journal article, 2022)
      System security assurance provides the confidence that security features, practices, procedures, and architecture of software systems mediate and enforce the security policy and are resilient against security failure and ...
    • A systematic literature review of how cybersecurity-related behavior has been assessed 

      Kannelønning, Kristian Andreas; Katsikas, Sokratis (Journal article; Peer reviewed, 2023)
      Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are ...
    • A Systematic Literature Review on RAMS analysis for critical infrastructures protection 

      Pirbhulal, Sandeep; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2021)
      Reliability, Availability, Maintainability, and Safety/Security (RAMS) analysis of Critical Infrastructures (CIs) can be applied to investigate their performance subjected to failure modes. The literature has witnessed ...
    • A systematic literature review on wireless security testbeds in the cyber-physical realm 

      Kampourakis, Vyron; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
      The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the convergence of formerly barricaded operational technology systems with modern information technology ones. Nevertheless, the increased ...
    • A Systematic Review of Cybersecurity Risks in Higher Education 

      Ulven, Joachim Bjørge; Wangen, Gaute Bjørklund (Peer reviewed; Journal article, 2021)
      The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive ...
    • A Systematic Review of Cybersecurity Risks in Higher Education 

      Ulven, Joachim Bjørge; Wangen, Gaute Bjørklund (Peer reviewed; Journal article, 2021)
      The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive ...
    • A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface 

      Oruma, Samson Ogheneova; Sánchez-Gordón, Mary; Colomo-Palacios, Ricardo; Gkioulos, Vasileios; Hansen, Joakim Klevmo (Peer reviewed; Journal article, 2022)
      There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: ...
    • A Systematic Review on the Use of Emerging Technologies in Teaching English as an Applied Language at the University Level 

      Blanka, Klimova; Pikhart, Marcel; Polakova, Petra; Cerna, Miloslava; Yayilgan, Sule; Shaikh, Sarang (Peer reviewed; Journal article, 2023)
      At present, emerging technologies, such as machine learning, deep learning, or various forms of artificial intelligence are penetrating different fields of education, including foreign language education (FLE). Moreover, ...
    • A Systematic Review on the Use of Emerging Technologies in Teaching English as an Applied Language at the University Level 

      Klimova, Blanka; Pikhart, Marcel; Polakova, Petra; Miloslava, Černá; Yildirim-Yayilgan, Sule; Shaikh, Sarang (Peer reviewed; Journal article, 2023)
      At present, emerging technologies, such as machine learning, deep learning, or various forms of artificial intelligence are penetrating different fields of education, including foreign language education (FLE). Moreover, ...
    • Systematically assessing the competence level of digital evidence handling 

      Heitmann, Odin; Franke, Katrin (Peer reviewed; Journal article, 2023)
      Norway is among the most digitalized countries in the world. For ex-ample, more than 91% of the citizens use mobile phones, and even more than 98% have access to the Internet. Hence, almost all kinds of criminal cases ...
    • Systematically Understanding Cybersecurity Economics: A Survey 

      Kianpour, Mazaher; Kowalski, Stewart James; Øverby, Harald (Peer reviewed; Journal article, 2021)
      Insights in the field of cybersecurity economics empower decision makers to make informed decisions that improve their evaluation and management of situations that may lead to catastrophic consequences and threaten the ...
    • Systemdynamisk tilnærming for risikoanalyse av transformasjonen til Nettverksbasert Forsvar 

      Skar, Rune Linchausen (Master thesis, 2006)
      NORSK: Overgangen til et nettverksbasert konsept for krigføring vil medføre en omfattende transformasjon av Forsvaret. Konseptets kjerne ligger i å skape en radikal prosessforbedring gjennom innovativ bruk av informasjons- ...