Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 1147-1166 av 2623
-
I still know who you are! Soft Biometric Keystroke Dynamics performance with distorted timing data
(Master thesis, 2021)Bruken av keystroke dynamics some en autentiserings metode er et godt undersøkt felt. I keystroke dynamics så bruker vi skrive måten, i tillegg til brukernavn og password, når vi autentiserer. En av problem stillingene som ... -
ID-fraud mitigation - A proposal of an EoI evaluation system operationalizing common objectives in ID proofing
(Master thesis, 2017)ID fraud is a serious problem around the world which can result in crimes like economic fraud, human trafficking and terrorism. Many Norwegian organizations has pointed out challenges in performing ID control. This work ... -
Identification of malicious behavior patterns for software
(Master thesis, 2014)Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ... -
Identification, Location Tracking and Eavesdropping on Individuals by Wireless Local Area Communications
(Master thesis, 2019)Nesten alt brukerutstyr med trådløs funksjonalitet har maskinvare som har en MAC-adresse innebygd. En MAC-adresse er en unik ID, i lag to av OSI-modellen [1], for å separere brukerutstyr i lokale nettverk (LAN). En MAC-adresse ... -
Identifying and Analyzing Dependencies in and among Complex Cyber Physical Systems
(Peer reviewed; Journal article, 2021)Contemporary Critical Infrastructures (CIs), such as the power grid, comprise cyber physical systems that are tightly coupled, to form a complex system of interconnected components with interacting dependencies. Modelling ... -
Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
(Journal article; Peer reviewed, 2018)Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ... -
Identifying keys using acoustic emanations from keystrokes
(Master thesis, 2023)Tidligere forskining har vist det er mulig å rekonstruere tekst skrevet på tastatur ved å analysere lyden som blir laget. Dette indikerer en stor sikkerhetstrussel, og et behov for videre forsking. I denne masteoppgaven ... -
Identifying Malicious Python Packages: Using Static Indicators and Machine Learning
(Master thesis, 2023)Delingskulturen som finnes på internett og spesielt knyttet til åpen kildekode har vært viktig ved den økende interessen for teknologi. Innenfor programmering og språk slik som Python lener seg på gruppen som produserer ... -
Identifying Proficient Cybercriminals Through Text and Network Analysis
(Chapter, 2020)A few highly skilled cybercriminals run the Crime as a Service business model. These expert hackers provide entry-level criminals with tools that allow them to enhance their cybercrime operations significantly. Thus, ... -
Identifying TLS abnormalities in Tor
(Master thesis, 2010)ENGELSK: This master thesis will examine Tor, which is an open-source anonymizing service used on the Internet. Tor gives the user an anonymous connection to the Internet in real-time. The research on Tor has been ... -
Identitetstyveri og identitetssvindel: konsekvenser i offentlig sektor
(Master thesis, 2011)Identitetsstyveri er i dag en av de sterkest voksende formene for kriminalitet i verden. I USA utsettes omslag 9 millioner mennesker for ID tyveri hvert år FTC1[1]. Leif T Aanensen fra Datatilsynet[2] hevder at hver nordmann ... -
Identity Federation for Cellular Internet of Things
(Chapter, 2018)Although the vision of 5G is to accommodate billions IoT devices and applications, its success depends very much on its ability to provide enhanced and affordable security. This paper introduces an Identity Federation ... -
Identity Management in a Fixed Mobile convergent IMS environment
(Master thesis, 2008)Today, there are still different technologies used in fixed and mobile networks environment such as cellular technologies (GSM, UMTS, 3G, etc.), wireless network technology like WLAN, wired network technology like ADSL, ... -
Identity Management in a Fixed-Mobile Convergent Environment
(Master thesis, 2010)The unification of fixed and mobile telecommunication networks could potentially lead to new and better services for the customers and allow telecommunication operators to re-use existing network infrastructure and lower ... -
Identity Management in M2M Networks
(Master thesis, 2014)Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable devices and therefore amount of transmitted data. This imposes new requirements for automatic device and data management ... -
Identity management on blockchain – privacy and security aspects
(Peer reviewed; Journal article, 2020)In the last years, identity management solutions on blockchain were proposed as a possible solution to digital identity management problems. However, they are still at an early stage, and further research needs to be done ... -
Identity management on VANETS
(Master thesis, 2012)Vehicular ad-hoc networks (VANETs) have envisioned various applications that substantially improve traffic safety and efficiency along the roads and highways. There are on-going projects both in academia and industry to ... -
Identity Management with Petname Systems
(Master thesis, 2009)In the first part of the thesis, we have focused on providing a brief overview of Petname Systems starting from the introductory concept of Entity, Identity and Identity Management with a brief description on different IdM ... -
Idol Show in China
(Master thesis, 2006)Our objective is to test the performance of a real SMS Processing System. We will work with Boost Communications, a norwegian company that is developing a SMS Processing System to sell interactive SMS solutions. With our ... -
IDSanity: a centralized and modular framework for managing IDPS and WAF rulesets
(Bachelor thesis, 2015)In a big and complex network of IDPS and/or WAF nodes it may become time-consuming and complicated to maintain and keep control of all the different rule sets which are active at a given time. This can potentially lead to ...