Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 904-923 av 2521
-
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging
(Journal article; Peer reviewed, 2018)Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ... -
Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging
(Journal article; Peer reviewed, 2019)Over the last years, considerable attention has been given to the privacy of individuals in wireless environments. Although significantly improved over the previous generations of mobile networks, LTE still exposes ... -
Experimental and Analytical Analysis of a Virtualized Network Function
(Master thesis, 2019)number of hardware appliances. Furthermore, deploying a new Network Function(NF) often requires installing yet another variety of proprietary hardware. This iscompounded by the increasing costs of energy and capital ... -
Experimental Assessment of Private Information Disclosure in LTE Mobile Networks
(Chapter, 2017)Open source software running on SDR (Software Defined Radio) devices now allow building a full-fledged mobile network at low cost. These novel tools open up for exciting possibilities to analyse and verify by experiments ... -
Experimental assessment on routing of network traffic in software using commodity hardware
(Master thesis, 2019)Prosessering av nettverkstrafikk i programvare på standardisert maskinvare er hovedtemaet for denne masteroppgaven. Overgangen fra å flytte prosesseringen fra spesialisert maskinvare til programvare har hatt en drastisk ... -
Experimental evaluation of DDoS detection and prevention using open-source and commodity hardware
(Master thesis, 2018)Distributed Denial of Service (DDoS) attack is a serious threat to companies with an active online business as its scope is increasing in size, frequency and complexity. That is why it has become a high priority task to ... -
Experimental Security Analysis of Connected Pacemakers
(Chapter, 2022)Medical devices and their connectivity capabilities are providing a variety of benefits to the healthcare domain, including remote monitoring, automated alerts, and improved patient outcomes. However, these medical devices ... -
Experimental validation of a new impedance based protection for networks with distributed generation using co-simulation test platform
(Peer reviewed; Journal article, 2019)Combined real-time hardware-in-the-loop simulations and modeling of communication networks (co-simulation platforms) is a powerful test-bed for development and validation of relay protection schemes utilizing communication ... -
Explainable Visualization for Morphing Attack Detection
(Peer reviewed; Journal article, 2022)Detecting morphed face images has become critical for maintaining trust in automated facial biometric verification systems. It is well demonstrated that better biometric performance of the Face Recognition System (FRS) ... -
Exploiting Race Conditions in Web Applications with HTTP/2
(Master thesis, 2020)Race conditions are a well-known problem in environments where there are several concurrent execution flows, such as threads or processes. Web applications often run in such a multithreaded environment, in which client ... -
Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol
(Journal article; Peer reviewed, 2019)The USB Power Delivery protocol enables USB-connected devices to negotiate power delivery and exchange data over a single connection such as a USB Type-C cable. The protocol incorporates standard commands;however, it also ... -
Exploring Digital Forensic Readiness: A Preliminary Study from a Law Enforcement Perspective
(Peer reviewed; Journal article, 2023)In today’s world of cybersecurity, it is not a question of whether an organization will experience a cyber attack, but rather a matter of when it will happen. These incidents can cause significant disruption and financial ... -
Exploring Libraries for Homomorphic Encryption
(Master thesis, 2018)Fully homomorphic encryption (FHE) is a very modern encryption technique which allows any number of efficient computations to be carried out on the encrypted data without having access to the secret key. FHE schemes can ... -
Exploring phishing detection features in webpage source code
(Master thesis, 2023)Phishing fortsetter å være en fremtredende cybersikkerhetstrussel, og utnytter menneskelige sårbarheter for å få uautorisert tilgang og stjele data. Hensikten med denne studien er å identifisere egenskapene som skiller ... -
Exploring possibilities for GitLab as a Learning Management System
(Bachelor thesis, 2022)Bachelor oppgaven er utført som et eksperiment for å utforske muligheter ved å bruke Gitlab som en Læringsstyrringssplattform (LMS). Det er en rekke utfordringer tilknyttet hva LMS tilstreber å tilby. Erik Hjelmås, ... -
Exploring siamese neural networks for similarity detection in fraudulent websites
(Master thesis, 2023)Økende digitalisering og kommunikasjonstilgang på tvers av landegrenser har tillat cyber-kriminelle å operere med flere fordeler enn myndighetene på internett. En av myndighetenes hovedutfordringer er den tidkrevende ... -
Exploring strategies to enhance the learning outcomes of Cyber Security, Education, Training and Awareness programs
(Master thesis, 2023)Denne oppgaven utforsker effektiviteten til ulike læringsstrategier for å forbedre evnen til å identifisere og svare på phishing-angrep. Tre grupper har deltatt i ulike opplæringsmetoder: ingen opplæring, standard cybertrening, ... -
Exploring the Computational Cost of Machine Learning at the Edge for Human-Centric Internet of Things
(Peer reviewed; Journal article, 2020)In response to users’ demand for privacy, trust and control over their data, executing machine learning tasks at the edge of the system has the potential to make the Internet of Things (IoT) applications and services more ... -
Exploring the design of smart home IoT - How autonomous and free are human users?
(Master thesis, 2022)Mennesker sin hverdag involverer i økende grad interaksjon med intelligent teknologi. I løpet av de siste par årene har menneskets mest private rom, nemlig hjemmene deres, stadig blitt mer tekniske gjennom den raske ...