Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 11-30 av 2624
-
A Basic Result on the Superposition of Arrival Processes in Deterministic Networks
(Chapter, 2018)Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ... -
A BERT-Based Approach to Norwegian Disinformation Detection, and the Effect of Automation Bias in Content Moderation
(Master thesis, 2024)Desinformasjon utvikler seg hele tiden, og det kan være en utfordring å skille fakta fra fiksjon på sosiale medier. Forskning på automatisert deteksjon av norsk desinformasjon er i en tidlig fase, og denne oppgaven tar ... -
A BERT-Based Approach to Norwegian Disinformation Detection, and the Effect of Automation Bias in Content Moderation
(Master thesis, 2024)Desinformasjon utvikler seg hele tiden, og det kan være en utfordring å skille fakta fra fiksjon på sosiale medier. Forskning på automatisert deteksjon av norsk desinformasjon er i en tidlig fase, og denne oppgaven tar ... -
A Case Study of a National Open Access Network in Norway
(Master thesis, 2015)Due to changes in the problem description during the work on this thesis, a more precise title to this thesis would be: "A Comparative Study of The Internet Access Markets in Norway and Sweden - Open Access Networks versus ... -
A Case Study of Usability Design in Ocean for Petrel Development at Schlumberger Information Solutions.
(Master thesis, 2009)AbstractSchlumberger is a service oilfield provider company which also develops their own software for their clients. They are in the special situation where they have developers who develop an API, which is then used to ... -
A Comparison between Business Process Management and Information Security Management
(Chapter, 2014)Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ... -
A comparison of sequence models for anomaly detection on process chains
(Master thesis, 2023)Abstrakt: Denne studien undersøker anvendelsen av maskinlæringsteknikker i verts-baserte Intrusion Detection Systems (HIDS), med fokus på analysen av prosessforhold, et underutforsket område i HIDS-forskning. Gjennom en ... -
A Computational Forensic Approach to the Analysis of Questioned Document Fragments
(Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2015, Doctoral thesis, 2015-05-29)Fragments of documents are common subjects in forensic analysis of questioned documents. Forensic analysis of torn document is more challenging owing to sparse data content; for example, a document fragment might consist ... -
A connectionless multicast protocol for MANETs
(2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter, 2012)In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ... -
A Constructive Approach to Support the Design of State Machines
(Master thesis, 2006)The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ... -
A Context-Aware System to Communicate Urgency Cues to Health Care Workers
(Master thesis, 2014)When nurses receive calls on their mobile phones, they need to decide whether to engage in the callor not. Several contextual factors play a role in making this decision. For example, if a nurse is busywith another patient ... -
A Control System Providing a Dynamic Overview of Emergency Situations at Oil and Gas Processing Plants
(Master thesis, 2009)Oil and gas processing plants handle very large volumes of gases and liquids, many of which are both flammable and poisonous. Combined with the high pressures often involved as part of the processing, an accident has the ... -
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility
(Chapter, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
A Demonstration on Service Compositions based on Natural Language Request and User Contexts
(Master thesis, 2008)The significant growth in mobile markets exposes business niches. A number of heterogeneous services have been offered to end users by several service providers. The end users can fully benefit from wide varieties of ... -
A diagrammatic notation for modeling access control in tree-based data structures
(Doctoral Theses at NTNU, 1503-8181; 2008:142, Doctoral thesis, 2008)This thesis describe two graphical modeling languages that can be used for specifying the access control setup in most systems that store information in a tree based structure. The Tree-based Access control Modeling ... -
A Dynamic Graph, Context, and Content Analysis Approach to Detect Cybergrooming
(Master thesis, 2024)Internett, og spesielt sosiale medier, har blitt en fundamental del av livene våre, uansett alder. Mange sosiale medieplattformer er rettet mot barn og gir dem mu- lighet til å kontakte nye venner uten å behøve og møtes ... -
A Dynamic Graph, Context, and Content Analysis Approach to Detect Cybergrooming
(Master thesis, 2024)Internett, og spesielt sosiale medier, har blitt en fundamental del av livene våre, uansett alder. Mange sosiale medieplattformer er rettet mot barn og gir dem mu- lighet til å kontakte nye venner uten å behøve og møtes ... -
A Fault-Tolerant and Consistent SDN Controller
(Chapter, 2016)Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ... -
A Feature Extraction Framework for Measuring Auditory Similarity Between Sounds
(Master thesis, 2022)Hver dag tas det opp tusenvis av timer med lyd i form av lydopptak og video. Denne lyden må noen ganger kommenteres og transkriberes for å hjelpe hørselshemmede, etterforskere eller muliggjøre skriftlige arkiver. Men å ...