• Towards Understanding of User Perceptions for Smart Border Control Technologies using a Fine-Tuned Transformer Approach 

      Shaikh, Sarang; Yildirim Yayilgan, Sule; Abomhara, Mohamed; Zoto, Erjon (Peer reviewed; Journal article, 2022)
      Smart Border Control (SBC) technologies became a hot topic in recent years when the European Union (EU) Commission announced the Smart Borders Package to improve the efficiency and security of the border crossing points ...
    • Towards Verifying Safety Properties of Real-Time Probabilistic Systems 

      Han, Fenglin; Blech, Jan Olaf; Herrmann, Peter Michael; Schmidt, Heinz (Journal article; Peer reviewed, 2014)
      Using probabilities in the formal-methods-based development of safety-critical software has quickened interests in academia and industry. We address this area by our model-driven engineering method for reactive systems ...
    • Tracing your smart-home devices conversations: A real world iot traffic data-set 

      Anagnostopoulos, Marios; Spathoulas, Georgios; Viaño, Brais; Augusto-Gonzalez, Javier (Peer reviewed; Journal article, 2020)
      Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ...
    • Tracking the presence of users by the presence of their device 

      Arteev, Pavel (Master thesis, 2014)
      Real-time locating systems (RTLS) are systems, which can automatically identify and track the objects. Such a system can be helpful at university in a way that students can find in which auditorium a professor is present ...
    • Traffic data processing using large scale graph processing systems 

      De Jong, Yorin Anne (Master thesis, 2014)
      Anomaly detection in internet traffic today is largely based on quantifying traffic data.This thesis proposes a new algorithm SpreadRank, which detects spreading of internet traffic as an additional metric for traffic ...
    • Traffic modeling for aggregated periodic IoT data 

      Hossfelt, Tobias; Metzger, Florian; Heegaard, Poul Einar (Chapter, 2018)
      The Internet of Things (IoT) is emerging in the telecommunication sector, and will bring a very large number of devices that connect to the Internet in the near future. The expected growth in such IoT nodes necessitates ...
    • Traffic Policing in Dynamic Military Networks Using Software Defined Networking 

      Skappel, Hans Fredrik (Master thesis, 2016)
      This thesis looks at how Software Defined Networking (SDN) can be used to provide traffic engineering and to police traffic in an Operational Military Network (OMN). SDN is a concept where the control plane is separated ...
    • Training the Trainers for Cybersecurity Exercises - Developing EXCON-teams 

      Østby, Grethe; Selebø, Bjørn Emil; Kowalski, Stewart James (Chapter, 2023)
      In recent years there has been a large increase in advanced computer attacks targeting Norwegian authorities and businesses. At the same time there is a great shortage of trained and qualified personnel within cyber- and ...
    • Transaction Characteristics of Bitcoin 

      Gebraselase, Befekadu Gezaheng; Helvik, Bjarne Emil; Jiang, Yuming (Chapter, 2021)
      Blockchain has been considered as an important technique to enable secure management of networks and network-based services. To understand such capabilities of a blockchain, e.g. transaction confirmation time, demands a ...
    • Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation 

      Rezgui, Zohra; Bassit, Amina; Veldhuis, Raymond Nicolaas Johan (Journal article; Peer reviewed, 2022)
    • Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation 

      Rezgui, Zohra; Bassit, Amina; Veldhuis, Raymond Nicolaas Johan (Peer reviewed; Journal article, 2022)
      Most deep learning-based image classification models are vulnerable to adversarial attacks that introduce imperceptible changes to the input images for the purpose of model misclassification. It has been demonstrated that ...
    • Transforming Collaborative Service Specifications into Efficiently Executable State Machines 

      Kraemer, Frank Alexander; Herrmann, Peter (Journal article; Peer reviewed, 2007)
      We describe an algorithm to transform UML 2.0 activities into state machines. The implementation of this algorithm is an integral part of our tool-supported engineering approach for the design of interactive services, in ...
    • Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic 

      Mendis, Handunneththi V. Kalpanie; Heegaard, Poul Einar; Casares-Giner, Vicente; Li, Frank Yong; Kralevska, Katina (Chapter, 2021)
      Network slicing enabled by fifth generation (5G) systems has the potential to satisfy diversified service requirements from different vertical industries. As a typical vertical industry, smart distribution grid poses new ...
    • Transparent Adaptable Network Access and Service Content Differentiation 

      Senneset, Thomas (Master thesis, 2006)
      Today s most advanced mobile devices support communication through a variety of network technologies; GSM (including GPRS and EDGE), UMTS, WLAN, Bluetooth, and IR. This master thesis characterizes different network ...
    • Treasure Hunt Components 

      Adrah, Charles Mawutor (Master thesis, 2012)
      The development of distributed, reactive and collaborative services is quite challenging. Rapidly composing services for collaborative learning activities require some development methods and tools. This thesis presents ...
    • Trends in Development of Databases and Blockchain 

      Raikwar, Mayank; Gligoroski, Danilo; Velinov, Goran (Chapter, 2020)
      This work is about the mutual influence between two technologies: Databases and Blockchain. It addresses two questions: 1. How the database technology has influenced the development of blockchain technology?, and 2. How ...
    • Triage of PE-files through divide-and-conquer clustering 

      Bae, Sturla Høgdahl (Master thesis, 2020)
      Antallet nye, unike ondsinnede filer som oppdages hver dag øker stadig. Grunnen til at det oppdages så mange nye filer, er ikke at det lages så mange helt nye varianter av skadevare hver dag, men fordi små endringer blir ...
    • Trust Management for a Smart Card Based Private eID Manager 

      Chen, Shi (Master thesis, 2016)
      Humans are smart when facing solely technical attacks; they invented technical strategies to defend against technical attacks. However, when facing a social engineering attack, a socio-technical attack, humans become the ...
    • Trust Management in Fog Computing 

      Dybedokken, Tuva Selstad (Master thesis, 2017)
      With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In fog computing allows for processing data along ...
    • Trusted secure service design: Enhancing trust with the future sim-cards 

      Vilarinho, Thomas Carlyle (Master thesis, 2009)
      The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this ...