• Using informed access network selection to improve HTTP adaptive streaming performance 

      Enghardt, Theresa; Zinner, Thomas; Feldmann, Anja (Chapter, 2020)
      As end-user devices often have multiple access networks available, choosing the most suitable network can help to improve application performance and user experience. However, selecting the best access network for HTTP ...
    • Using machine learning for optimal SLA/SLO contract negotiation in 5G 

      Zhu Zhu (Master thesis, 2020)
      The objective of this master thesis is to optimize strategy in the multi-operator domain to achieve the lowest overall cost while meeting the dependability SLO by using machine learning. To reach this objective, we ...
    • Using machine learning to detect cyber and physical attacks in mobile robots 

      Nyusti, Levente (Master thesis, 2023)
      Ettersom bruken av roboter øker i industrien for å løse ulike utfordringer, øker også behovet for å sikre disse løsningene. Dette gjelder spesielt for mobile roboter, hvor angrep fra en ondsinnet aktør potensielt kan ha ...
    • Using metrics to assess the ICC perceptual rendering intent 

      Falkenstern, Kristin; Bonnier, Nicolas; Pedersen, Marius; Brettel, Hans; Vienot, Francoise (Proceedings of SPIE;7867, Journal article; Peer reviewed, 2011)
      Increased interest in color management has resulted in more options for the user to choose between for their color management needs. We propose an evaluation process that uses metrics to assess the quality of ICC profiles, ...
    • Using NetFlow analysis to detect worm propagation 

      Fossbakk, Kjell Tore (Master thesis, 2010)
      ENGELSK: The Internet has become the main network for commerce, recreation and communication and this has increased the need to protect sensitive information. Computer worms will continue to pose a major threat to us, ...
    • Using Netflows for slow portscan detection 

      Malmedal, Bjarte (Master thesis, 2005)
      NORSK: Organisasjoner som har en definert sikkerhetsstrategi har ofte implementert systemer for inntrengningsdeteksjon. Slike løsninger fokuserer som regel på sann-tids analyse av sikkerhetstruende hendelser i ...
    • Using Neural Networks for IoT Power Management 

      Stephansen-Smith, Finn Julius (Master thesis, 2020)
      De fleste enheter i Tingenes Internett (IoT) har begrenset batterilevetid. For å likevel kunne være pålitelige er de nødt til å utnytte batteriet på en så optimal måte som mulig. Dette prosjektet ser på hvorvidt nevrale ...
    • Using NTFS cluster allocation behavior to find the location of user data 

      Karresand, Nils Martin Mikael; Axelsson, Stefan; Dyrkolbotn, Geir Olav (Journal article; Peer reviewed, 2019)
      Digital forensics is heavily affected by the large and increasing amount of data to be processed. To solve the problem there is ongoing research to find more efficient carving algorithms, use parallel processing in the ...
    • Using Perceptual Hash Algorithms to Identify Fragmented and Transformed Video Files 

      Kjelsrud, Ola (Master thesis, 2014)
      ENGLISH: Over the last decades the amount of generated video content has increased exponentially. Easy access to video recording equipment and the Internet has given anyone the ability to create and share video material ...
    • Using SIM for strong end-to-end Application Authentication 

      Lunde, Lars; Wangensteen, Audun (Master thesis, 2006)
      Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both ...
    • Using SIM for strong end-to-end Application Authentication 

      Lunde, Lars; Wangensteen, Audun (Master thesis, 2006)
      Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both ...
    • Using Social Media as Evidence in Criminal Investigations 

      Siljan, Marianne Voss (Master thesis, 2023)
      Bruken av sosiale medier har vokst eksponentielt gjennom årene, så vel som mengden kriminalitet som utføres på sosiale medieplattformer. Med denne veksten følger utfordringer med å bruke data fra sosiale medier i etterforskning ...
    • Using the human gait for authentication 

      Søndrol, Torkjel (Master thesis, 2005)
      NORSK: Denne rapporten presenterer en ny metode for å verifisere en persons identitet ved hjelp av kinetisk ganglagsanalyse. Ganglagsdata samles inn ved å bruke en innretning festet til personens bein, hvor den registrerer ...
    • Using the object ID index as an investigative approach for NTFS file systems 

      Nordvik, Rune; Toolan, Fergus; Axelsson, Stefan (Journal article; Peer reviewed, 2019)
      When investigating an incident it is important to document user activity, and to document which storage device was connected to which computer. We present a new approach to documenting user activity in computer systems ...
    • Using the triangle inequality to speed-up anomaly detection systems based on the k-means clustering 

      Holm, Ole Martin (Master thesis, 2022)
      Det finnes en mange teknikker og algoritmer som kan brukes for å forbedre et inntrengningsdeteksjonssystem. Innenfor algoritmer for inntrengningsdeteksjonssystemer er maskinlæring en ønskelig metode da den kan redusere ...
    • Using Theories from Economics and Finance for Information Security Risk Management 

      Pandey, Pankaj (Doctoral theses at NTNU;2016:187, Doctoral thesis, 2016)
      Risk management in information security has traditionally been approached from a technical perspective, and a variety of technical controls are deployed to prevent any future information security event. However, recent ...
    • Utarbeide masterplan for transportnett-utbygging i Finnmark fylke 

      Vinjevoll, Olav-Arne Hustad (Master thesis, 2007)
      Finnmark Fylke har i dag, som eneste fylke i Norge, et transportnett som i all hovedsak bæres av radiolinjeforbindelser. Disse er imidlertid på vei til å møte sine kapasitetsbegrensninger. Gitt det faktum at radiolinjefo ...
    • Utilisation of the perceived benefits of training new employees in information security 

      Gedde-Dahl. Jonas Tysdahl (Master thesis, 2019)
      Kunnskap og opplæring er en avgjørende del av å skape en bevissthet rundt informasjonssikkerhet og å skape atferdsendring. I Norge er det ingen opplæring eller utdanning i informasjonssikkerhet på skolen eller som på andre ...
    • Utilization of ServiceNow’s Risk Management Functionality Within the GRC Module: A Case Study 

      Kjærvik, Synne Bakke (Master thesis, 2023)
      I en tid med økende kompleksitet og risiko, er styring av governance, risk, and compliance (GRC) innen organisasjoner mer kritisk enn noen gang. Denne masteroppgaven undersøker potensialet til ServiceNow's GRC-modul og et ...
    • Utilizing Connectivity Maps to Accelerate V2I Communication in Cellular Network Dead Spots 

      Meyer, Jon Arild Ekberg; Puka, Ergys; Herrmann, Peter (Peer reviewed; Journal article, 2020)
      On many roads in rural and mountainous areas, the cellular network connectivity is intermittent and dead spots, i.e., zones without any coverage, are frequent. In previous work, we developed a data dissemination protocol ...