Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 398-417 av 2624
-
C.S. Technopoly: A Megagame for Teaching and Learning Cybersecurity
(Chapter, 2023) -
Calculating the Carbon Footprint of Digital Services: Toward User Awareness
(Master thesis, 2023)I dagens samfunn er buzzwords som Internet of Things (IoT), skytje- nester, Artificial Intelligence (AI) og Viritual Reality (VR) stadig mer utbredt, noe som gjenspeiler den pågående teknologiske revolusjonen på verdensbasis. ... -
Calibration of mismatch effects in time-interleaved analog-to-digital converters
(Master thesis, 2013)The performance of time-interleaved analogue-to-digital (A/D) converters is often significantly degraded by timing mismatch errors. In this project we explore methods for performing reconstruction of signals from recurrent ... -
A Call for Mandatory Input Validation and Fuzz Testing
(Journal article; Peer reviewed, 2023)The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and ... -
Camera based Display Image Quality Assessment
(Doctoral Dissertations at Gjøvik University College;3-2015, Doctoral thesis, 2015-11-04)This thesis presents the outcomes of research carried out by the PhD candidate Ping Zhao during 2012 to 2015 in Gjøvik University College. The underlying research was a part of the HyPerCept project, in the program of ... -
Campusguiden: En navigasjonstjeneste for innendørs bruk
(Master thesis, 2011)Oppgaven har kartlagt nytte og betalingsvilje for CampusGuiden ved to ulike marked. Til dette ble en kvalitativ forskningsmetode benyttet. Det har blitt laget en forretningsmodell, som blant annet beskriver aktører, kostnader ... -
CampusGuiden: Indoor Positioning, Data Analysis and Novel Insights
(Master thesis, 2013)A positioning system enables a mobile device to determine its position, and makes the position of the device available for position-based services such as navigation, tracking or monitoring. The fact that GPS satellite-based ... -
Can Blockchain Spark off the Reincarnation of India’s Living Dead?
(Chapter, 2018)A large number of studies have found a negative correlation between economic growth and corruption. Therefore, governments implement various anti-corruption measures particularly technology-based mechanisms. The government ... -
Can network security be fun? : an agent-based simulation model and game proposal
(Master thesis, 2006)NORSK: Altfor ofte lærer man om nettverk- og informasjonssikkerhet gjennom egne, dårlige, erfaringer, eller gjennom såkalt “learning by burning”. Dette kan være en kostbar affære. De fleste internettbrukere mangler ... -
Can no-reference image quality metrics assess visible wavelength iris sample quality?
(Journal article; Peer reviewed, 2017)The overall performance of iris recognition systems is affected by the quality of acquired iris sample images. Due to the development of imaging technologies, visible wavelength iris recognition gained a lot of attention ... -
Capacity of Mobile Ad Hoc Networks Using an Airborne Relay
(Master thesis, 2016)Self-organizing wireless networks is an interesting technology with a potential of providing robust communication in environments without existing infrastructure and a minimum of configuration. Such features seem especially ... -
Carrier Synchronization in OFDM without Use of Pilots
(Dr. ingeniøravhandling, 0809-103X; 2000:111, Doctoral thesis, 2000)Among new emerging digital communication systems, there is a clear trend of an increasing number of services using high capacity broad band connections, e.g. transfer of images, video and high quality sound. This makes it ... -
Case study analysis: Insider incidents at Volvo, Scania, Den Norske Veritas (DNV), the Swedish Security Service (SÄPO) and the Swedish Military Intelligence
(Master thesis, 2023)Denne oppgaven omhandler innsidetrusselen relatert til statlige aktører som rekrutterer mennesker, til innhenting av informasjon som ellers ikke hadde vært tilgjengelig. Denne angrepsvektoren er godt beskrevet og gjort ... -
A case study of a municipality phishing attack measures - towards a socio-technical incident management framework
(Peer reviewed; Journal article, 2021)During the Corona-crisis, the number of data breaches and hacking increased rapidly. For some organizations it was difficult to handle both the Corona-crises and such attacks. A decision made to prevent this overload of ... -
CCA Functional Structure & Architecture
(Research report, 2011) -
Centralizing security and operations of Windows clients in an emergency care IT infrastructure
(Bachelor thesis, 2021)HDO er i dag i en omstillingsprosess der de ønsker å anskaffe en ny kommunikasjonsløsning for det norske nødnettet. Som en del av deres nye løsning, vil HDO sende ut Windows klienter til lokasjoner knyttet til nødnettet, ... -
Certificatless authenticated two-party key : agreement protocol
(Master thesis, 2006)NORSK: Utfordringen i dag ved å utvikle sikre systemer basert på offentlig-nøkkel kryptografi er ikke det å velge tilstrekkelig sikre algoritmer og implementere disse, men heller å utvikle en infrastruktur som forsikrer ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
Chain-on, Chain-off: A Comparative Analysis of Crypto-Asset Exchange Models
(Master thesis, 2023)Denne masteroppgaven presenterer en omfattende og grundig sammenlignende analyse av sentraliserte børser (CEXer) og desentraliserte børser (DEXer) innenfor kryptovaluta-børslandskapet. Forskningen som er gjennomført i denne ... -
Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects
(Journal article; Peer reviewed, 2018)The goal of secure software engineering is to create software that keeps performing as intended even when exposed to attacks. Threat modeling is considered to be a key activity, but can be challenging to perform for ...