• Hadoop, and Its Mechanisms for Reliable Storage 

      Midthaug, Ingvild Hovdelien (Master thesis, 2018)
      Nowadays the global amount of digital data increases rapidly. Internet-connected devices generate massive amounts of data through various interactions such as digital communication and file sharing. In a world surrounded ...
    • Handle Firewall Security Policy by Graphical Traffic Matrix: Grouping of Firewall Rules 

      Kaspersen, Arne Yngve (Master thesis, 2007)
      Organizations today are in trust of the diversity the Internet gives. With a connection they re able to do end-to-end communication with customers and partners everywhere in the world, and because the diversity of Internet, ...
    • Handover between Wireless Networks for Medical Applications 

      Agostini, Michele (Master thesis, 2016)
      This project takes inspiration from the medical area and focuses on how the Internet of Things can provide improvements. The idea is to build a system that leaves the patients move freely in the hospital and in the meanwhile ...
    • Hardware-In-the-Loop (HIL) networksimulation for supporting electrical power grid sub-stations 

      Molander, Johnny (Master thesis, 2021)
      Utviklingen av strømnettet går mot en digitalisering og konvensjonelle transformatorstasjoner (eng: sub-stations) planlegges å fases ut til fordel for digitaliserte. Ved å digitalisere transformatorstasjonene er det mulig ...
    • Hardware-in-the-loop testing of impedance protection with compensation of fault impedance and DG infeed current 

      Pandakov, Konstantin; Adrah, Charles Mawutor; Liu, Zhou; Hoidalen, Hans Kristian; Kure, Øivind (Journal article; Peer reviewed, 2018)
      The standard impedance protection deployed in distribution networks can malfunction due to underreach errors caused by fault impedances and remote infeed currents from embedded generators (becoming more and more widespread). ...
    • Hash Functions and Gröbner Bases Cryptanalysis 

      Ødegård, Rune Steinsmo (Doktoravhandlinger ved NTNU, 1503-8181; 2012:111, Doctoral thesis, 2012)
      Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications by themselves, and they ...
    • HashTag Erasure Codes: From Theory to Practice 

      Kralevska, Katina; Gligoroski, Danilo; Jensen, Rune Erlend; Øverby, Harald (Journal article; Peer reviewed, 2018)
      Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. ...
    • Healthcare Security Practice Analysis, Modelling and Incentivization 

      Yeng, Prosper Kandabongee (Doctoral theses at NTNU;2023:170, Doctoral thesis, 2023)
      The human aspect of information security practice has become a global concern. According to Verizon’s 2022 data breaches report, over 80% of data breaches were caused by the human aspect, and this trend has been consistent ...
    • Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey 

      Yeng, Prosper; Yang, Bian; Snekkenes, Einar Arthur (Journal article; Peer reviewed, 2019)
      The purpose of this study was to understand healthcare staffs' information security (IS) practices towards mitigating data breaches. A literature survey was conducted to understand the state-of-the-art methods, tools, ...
    • HEBI: Homomorphically Encrypted Biometric Indexing 

      Bauspieß, Pia; Grimmer, Marcel; Fougner, Cecilie; Le Vasseur, Damien; Stöcklin, Thomas Thaulow; Rathgeb, Christian; Kolberg, Jascha; Costache, Anamaria; Busch, Christoph (Chapter, 2023)
      Biometric data stored in automated recognition systems are at risk of attacks. This is particularly true for large-scale biometric identification systems, where the reference database is often accessed remotely. A popular ...
    • Hendelseshåndtering i små og mellomstore bedrifter 

      Sand, Lars Arne; Wangen, Gaute Bjørklund; Frogner, Anders Sand (Bachelor thesis, 2010)
      Hendelseshåndtering er et spennende og viktig tema innenfor informasjonssikkerhet. Det finnes en del faglitteratur om emnet, men kunnskapen om hvordan hendelseshåndtering anvendes er ikke godt kartlagt. Det var derfor ...
    • Hessian-based Robust Ray-Tracing of Implicit Surfaces on GPU 

      Singh, Jag Mohan; Wasnik, Pankaj Shivdayal; Ramachandra, Raghavendra (Chapter, 2018)
      In recent years, the Ray Tracing of Implicit Surfaces on a GPU has been studied by many researchers. However, the existing methods have challenges that mainly includes solving for self-intersecting surfaces. General solutions ...
    • Heterogeneous Preferences and Patterns of Contribution in Cybersecurity as a Public Good 

      Kianpour, Mazaher (Chapter, 2021)
      This paper presents an agent-based model of contribution to cybersecurity as a participatory public good. Ineffective cybersecurity measures pose serious threats and risks to the development and stability of information ...
    • High level information security risk in higher education 

      Ulven, Joachim (Master thesis, 2020)
      Identifisere verdier, trusler og sårbarheter er avgjørende når du vurderer risikoer i organisasjoner. Flere av de mest kjente informasjonssikkerhetsrisiko rammeverkene som ISO/IEC 27005, NIST SP 800-39 og OCTAVE bruker ...
    • Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks 

      Gray, Nicolas; Grigorjew, Alexej; Hossfeld, Tobias; Apoorv, Shukla; Zinner, Thomas Erich (Chapter, 2019)
      Modern networks increasingly rely on Software-defined Networking (SDN) and Network Function Virtualization (NFV) to augment their flexibility in high load scenarios. To further enhance the performance, a part of the ...
    • HIKOS - Highly Secure, Intelligent Software Copy-Protection 

      Veseli, Fatbardh (Master thesis, 2011)
      Software piracy, which includes reproducing and distributing software products illegaly and without authorization, continues to cause financial losses to software vendors. Dongles for hardware protection have been present ...
    • Hip movement based authentication: how will imitation affect the results? 

      Buvarp, Tor Erik (Master thesis, 2006)
      NORSK: Denne oppgaven vil se på en metode innen biometrisk autentisering som er ganske ny innen denne type forskning. Metoden tar for seg autentisering av en person ved å registrere hofte bevegelsen i løpet av ordinær ...
    • Holding on to Compliance While Adopting DevSecOps: An SLR 

      Ramaj, Xhesika; Sanchez Gordon, Mary Luz; Gkioulos, Vasileios; Chockalingam, Sabarathinam; Colomo-Palacios, Ricardo (Journal article; Peer reviewed, 2022)
      The software industry has witnessed a growing interest in DevSecOps due to the premises of integrating security in the software development lifecycle. However, security compliance cannot be disregarded, given the importance ...
    • A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda 

      Nweke, Livinus Obiora; Wolthusen, Stephen (Peer reviewed; Journal article, 2020)
      Critical infrastructure is an asset or a system that is essential for the maintenance of vital societal functions. The protection of such an infrastructure requires more than a technical understanding of the underlying ...
    • A Holistic Approach to Dependability Modeling and Analysis of Smart Distribution Grids 

      Zerihun, Tesfaye Amare (Doctoral theses at NTNU;2021:56, Doctoral thesis, 2021)
      Lately, the distribution grid has been under a significant transformation, with a pervasive integration of Information and Communication Technology (ICT) for an enhanced operation and management of the grid. Some of the ...