• Web3 and Blockchain for Modernizing the Reseller Market 

      Frøland, Håkon Isaksen; Palm, Edward; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2023)
      This paper presents a proof-of-concept (PoC) that leverages Web3 technology, specifically blockchain and Non-Fungible Tokens (NFTs), to create a secure, transparent, and fair reseller market without the need for a trusted ...
    • Web3 Security in Reseller Markets with Proof of Concept Implementations 

      Palm, Edward; Frøland, Håkon Isaksen (Master thesis, 2023)
      I tradisjonelle bruktmarkeder er det utfordringer relatert til håndtering av kvitteringer, skjevfordelt informasjonstilgang, mangel på tillit og tvilsomt opphav. Denne avhandlingen presenterer et konseptbevis (POC) som ...
    • Web3 Security in Reseller Markets with Proof of Concept Implementations 

      Frøland, Håkon Isaksen; Palm, Edward (Master thesis, 2023)
      I tradisjonelle bruktmarkeder er det utfordringer relatert til håndtering av kvitteringer, skjevfordelt informasjonstilgang, mangel på tillit og tvilsomt opphav. Denne avhandlingen presenterer et konseptbevis (POC) som ...
    • Webex and Networking Interference 

      Jensen, Dennis; Karlsen, Knut-Magnus; Karlsen, Ole Morten Ystad (Bachelor thesis, 2022)
      Hensikten med denne bacheloroppgaven var å få oversikt over hvordan forskjellige faktorer kan påvirke Webex Meetings plattformen og skape dårlig nettkvalitet. Oppgaven består av tre forskjellige scenarioer som omhandler ...
    • Webpage Fingerprinting using Infrastructure-based Features 

      Bakken, Martin Schiefloe (Master thesis, 2023)
      Kriminalitet på internett utvikler seg i dag med et stadig større tempo. Kriminelle aktører benytter seg av nettsider for å spre ulovlig innhold, og til kjøp og salg av ulovlige varer og tjenester. Gjennom disse sidene kan ...
    • WECIA Graph: Visualization of Classification Performance Dependency on Grayscale Conversion Setting 

      Skrabánek, Pavel; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2018)
      Grayscale conversion is a popular operation performed within image pre-processing of many computer vision systems, including systems aimed at generic object categorization. The grayscale conversion is a lossy operation. ...
    • The WEIRDness of QoE research: The diversity of QoMEX authorship considering locality and gender 

      Himmelsbach, Julia; De Moor, Katrien; Sackl, Andreas; Schatz, Raimund; Tschegili, Manfred (Peer reviewed; Journal article, 2021)
      The situatedness of researchers and developers influences the whole research process from ideas to methods to results. To assess the diversity of perspectives in the QoE field, we conducted a quantitative content analysis ...
    • Well Structured, Secure and Efficient Alert Notifications 

      Ask, Merete (Master thesis, 2014)
      This thesis assembles and presents a set of organization generic, but alert notification specific recommendations. Recommendations any arbitrary organization may consider to establish and continuously improve well structured, ...
    • White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019 

      Assenza, Giacomo; Cozzani, Valerio; Flammini, Francesco; Gotcheva, Nadezhda; Gustafsson, Tommy; Hansson, Anders; Heikkilä, Jouko; Iaiani, Matteo; Katsikas, Sokratis; Nissilä, Minna; Oliva, Gabriele; Richter, Eleni; Roelofs, Maaike; Saman Azari, Mehdi; Setola, Roberto; Stejin, Wouter; Tugnoli, Alessandro; Vanderbeek, Dolf; Westerdahl, Lars; Ylönen, Marja; Young, Heather (Chapter, 2019)
      The security of critical infrastructures is of paramount importance nowadays due to the growing complexity of components and applications. This paper collects the contributions to the industry dissemination session within ...
    • Why securing smart grids is not just a straightforward consultancy exercise 

      Line, Maria Bartnes (Journal article; Peer reviewed, 2014)
      The long-term vision for modernization of power management and control systems, Smart Grid, is rather complex. It comprises several scientific traditions; SCADA and automation systems, information and communication technology, ...
    • Wi-Fi based Telecommunication Infrastructure Delivered as a Service by UAV for Emergency Response 

      Zolich, Artur Piotr; Fonseca Palma, David; Birkeland, Roger; Cisek, Krzysztof Piotr; Johansen, Tor Arne (Chapter, 2022)
      In this paper we discuss Wi-Fi and complementary technologies that can be used to mitigate telecommunication gaps in search and rescue (SAR) activities and during natural disaster (ND) response scenarios. We present and ...
    • Windows 10 Memory Compression in Digital Forensics - Uncovering Digital Evidence in Compressed Swap 

      Østerud, Aleksander (Master thesis, 2018)
      Digital investigators and incident responders often rely on evidence residing in computer memory and page files on hard drives. Artifacts such as browsing history, image thumbnails and shell commands can answer important ...
    • Windows Security Baselines 

      Mads Reneflot Moe; Mats Nerhagen (Bachelor thesis, 2022)
      I cyber-sikkerhet i dag er ondsinnede aktører og angrepsmetodene de bruker under konstant utvikling for å finne nye og kreative måter på å tilegne seg uautorisert tilgang til IT systemer. Ettersom disse trusslene utvikler ...
    • Windows Server 2019/2022 and Azure Cloud security systems - A general recommendation 

      Rise, Helleik Rabba; Engen, Stian (Bachelor thesis, 2022)
      Organisasjoner i dag har mange cybertrusler som de bør være oppmerksomme på og som de bør aktivt beskyttes imot. Det er mange sikkerhetsfunksjoner som er viktige å bruke for å aktivt beskytte seg imot disse sikkerhetstru ...
    • WireGuard for Securing Constrained Application Protocol for IoT Devices (CoAP) 

      Kazakova, Evgenia (Master thesis, 2021)
      With the ever-rising popularity of Internet of Things (IoT) devices, the issue of securing communication between the constrained nodes in the IoT network while still achieving adequate speed and performance is as significant ...
    • Wireless LAN auditing procedure for industrial environments 

      Ohm, Magnus Andreas (Master thesis, 2017)
      Today's industry is dependent on computer networks. These computer networks are a vital part of how industrial environments operate. They are used for a variety of different tasks. Networks are needed to do everything from ...
    • Wireless powered cognitive radio networks with multiple antenna sources and hardware impairments 

      Prathima, Addanki; Gurjar, Devendra S.; Jiang, Yuming; Yadav, Suneel (Peer reviewed; Journal article, 2022)
      In this paper, a radio-frequency (RF) energy harvesting enabled cognitive radio network (CRN) is considered in the presence of transceiver hardware impairments (HIs). Herein, one of the secondary nodes (SNs) exploits ...
    • Wireless Sensor Networks, energy efficiency and path recovery 

      Kampen, Anne-Lena (Doctoral theses at NTNU;2017:135, Doctoral thesis, 2017)
      Wireless Sensor Networks (WSN) consists of sensor nodes equipped with radios for wireless communication. The overall goal of the sensor networks is to gather data. The terminal point for the data is usually a specific ...
    • Wireless USRP Test-bed for DSRC Applications 

      Hansen, Jonathan (Master thesis, 2016)
      Dedicated Short-Range Communications (DSRC) is a wireless communication technology used in Intelligent Transport Systems for road vehicles. Applications utilizing DSRC are becoming more and more widespread, and include ...
    • With a Little Help from Your Friends: Collaboration with Vendors During Smart Grid Incident Response Exercises 

      Langås, Mari; Løfqvist, Sanna; Katt, Basel; Haugan, Thomas Sagvold; Jaatun, Martin Gilje (Chapter, 2021)
      The introduction of Information and Communications Technology (ICT) into conventional power grids has resulted in a digitalized smart grid, enabling a more efficient and robust operation. However, it can also lead to ...