Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Title
Now showing items 2465-2484 of 2525
-
Vein Pattern Recognition Using Chain Codes, Spatial Information and Skeleton Fusing
(Chapter; Peer reviewed, 2012)Vein patterns are a unique attribute of each individual and can therefore be used as a biometric characteristic. Exploiting the specific near infrared light absorption properties of blood, the vein capture procedure is ... -
VerifyMed - Application of blockchain technology to improve trust in virtualized healthcare services
(Master thesis, 2020)Helsevesenet går mot økt bruk av digitale helsetjenester. Ved å bruke slike tjenester kan pasienter møte helsepersonell ved bruk av nettbaserte applikasjoner, for eksempel via digitale konsultasjoner på video eller chat. ... -
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept
(Chapter, 2020)Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to ... -
Verktøy for helhetlig risikostyring og informasjonssikkerhet: Bruk av Return on Security Investment for kost/nytte-analyse av investeringer i informasjonssikkerhet
(Master thesis, 2008)Investeringer i informasjonssikkerhet utgjør i dag en stor del av organisasjoners investeringer. På bakgrunn av dette er det økende etterspørsel etter kost/nytte-analyser for investeringer i informasjonssikkerhet. ... -
Video - based fall detection in elderly’s houses
(Master thesis, 2008)NORSK: Automatisk oppdagellse av en fallende person som blir basert påvideoanalyse er et viktig problem med anvendelse i sikkerhetsområder samt støttende hjemmiljøer og gamlehjem. Bruken av datavisjonssystemer byr en ... -
Video QoE Killer and Performance Statistics in WebRTC-based Video Communication
(Chapter, 2016)Abstract: In this paper, we investigate session-related performance statistics of a Web-based Real-Time Communication (WebRTC) application called appear.in. We explore the characteristics of these statistics and explore ... -
Videoconference Fatigue: A Conceptual Analysis
(Peer reviewed; Journal article, 2022)Videoconferencing (VC) is a type of online meeting that allows two or more participants from different locations to engage in live multi-directional audio-visual communication and collaboration (e.g., via screen sharing). ... -
Videokonsultasjoner i primærhelsetjenesten: opplevd kvalitet og brukeropplevelser
(Master thesis, 2021)Etter å ha sett en økning de siste årene, tok bruken av verktøy for videokonferanser av som følge av koronapandemien. Med den økende utviklingen av verktøy og tjenester for videokonferanser, blir behovet for å evaluere ... -
Virtual (floating) Context Sharing between Vehicles: Generating and Sharing Context Information within an Autonomous Network of Vehicles
(Master thesis, 2010)This thesis investigates some of the potential within Intelligent Transportation Systems and Inter-Vehicle Communication. The aim is to find a method for spreading information throughout an ad hoc network of vehicles with ... -
Virtual desktop and cloud services: new security demand
(Master thesis, 2012)Recently, the adoption of cloud services has led to several security concerns. Cloud services in most cases have benefits on reducing the cost and increasing the flexibility. Cloud adaption may cause several security ... -
Virtual Wires: Rethinking WiFi networks
(Chapter, 2019)WiFi is the dominant means for home Internet access, yet is frequently a performance bottleneck. Without reliable, satisfactory performance at the last hop, end-to-end quality of service (QoS) efforts will fail. Three major ... -
Virtualize A Piece Of Evidence Or Mount Its Partition With Linux
(Master thesis, 2019)Abstract In a computer forensic investigation, there is always a divergence between the time required to visualize data from evidence and the times when investigators need the data to evaluate it. On the one hand, the ... -
Vision-based robotic system for picking and inspection of small automotive components
(Journal article; Peer reviewed, 2016)The use of vision systems for industrial robot guidance and quality control becomes much harder when the manufactured products and their components are small and possess reflective surface. To assure an effective automated ... -
Visualization of large scale Netflow data
(Master thesis, 2016)Networks are forwarding more and more data every year, thus its harder to reveal malicious traffic among all of it. Current systems might not be capable of keeping up with the rapid pace of the growth, and might not be ... -
Visualization of Network Traffic to Detect Malicious Network Activity
(Master thesis, 2008)Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However, the network administrators still have very limited insight into the logging data, mainly due to the lack of efficient ... -
Visualizing Spatial and Temporal Dynamics of a Class of IRC-Based Botnets
(Master thesis, 2010)Botnets are a serious threat to the security of personal computers, businesses and even countries. They can launch attacks on remote systems and infrastructure, perform espionage and once installed they essentially hand ... -
VNF Orchestration and Power-disjoint Traffic Flow Routing for Optimal Communication Robustness in Smart Grid with Cyber-Physical Interdependence
(Peer reviewed; Journal article, 2022)We explore the use of software-defined networking (SDN) technology in building a communication network for smart grid. With cyber-physical interdependence, such communication network may suffer from cross-network cascading ... -
VoIP Security
(Master thesis, 2008)VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no ... -
Vote Selling Resistant Voting
(Peer reviewed; Journal article, 2020)Creating a secure (purely) remote voting scheme which prevents active vote selling is an open problem. Observing that vote selling has a primarily economic motivation, we propose a novel approach to the problem which ... -
Vulnerability Discovery Modelling With Vulnerability Severity
(Peer reviewed; Journal article, 2019)Web browsers are primary targets of attacks because of their extensive uses and the fact that they interact with sensitive data. Vulnerabilities present in a web browser can pose serious risk to millions of users. Thus, ...