Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 21-40 av 2522
-
A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility
(Chapter, 2019)The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ... -
A Demonstration on Service Compositions based on Natural Language Request and User Contexts
(Master thesis, 2008)The significant growth in mobile markets exposes business niches. A number of heterogeneous services have been offered to end users by several service providers. The end users can fully benefit from wide varieties of ... -
A diagrammatic notation for modeling access control in tree-based data structures
(Doctoral Theses at NTNU, 1503-8181; 2008:142, Doctoral thesis, 2008)This thesis describe two graphical modeling languages that can be used for specifying the access control setup in most systems that store information in a tree based structure. The Tree-based Access control Modeling ... -
A Fault-Tolerant and Consistent SDN Controller
(Chapter, 2016)Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ... -
A Feature Extraction Framework for Measuring Auditory Similarity Between Sounds
(Master thesis, 2022)Hver dag tas det opp tusenvis av timer med lyd i form av lydopptak og video. Denne lyden må noen ganger kommenteres og transkriberes for å hjelpe hørselshemmede, etterforskere eller muliggjøre skriftlige arkiver. Men å ... -
A Flexible Way to Dynamically Visualize Spatiotemporal Data in a Geographic Information System
(Master thesis, 2018)In this project thesis, with the development of the dynamic system, we have shown that it is possible to visualize spatiotemporal data flexibly in real-time and which can also be examined from anywhere. The achieved system ... -
A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
(Journal article; Peer reviewed, 2017)In general, an information security risk assessment (ISRA) method produces risk estimates, where risk is the product of the probability of occurrence of an event and the associated consequences for the given organization. ... -
A Framework for the Information Classification in ISO 27005 Standard
(Chapter, 2017)Information Security Risk Management (ISRM) process involves several activities to conduct a risk management (RM) task in an organization. ISRM activities require access to various information related to the organization. ... -
A Framework for the Validation of Network Artifacts
(Journal article; Peer reviewed, 2019) -
A Game Based Long-Term Recruitment Framework
(Master thesis, 2019)Det er et stort behov for ny generasjon av sikkerhetsesksperter i industrien som er i dag, hvor cyberangreper fortsetter å lykkes mens det er mangel på dyktige fagpersoner innen dette følgende fagfeltet. Det er videre ... -
A Gap Analysis of Implemented Barriers and Recommended Best Practices in Oil and Gas Cyber Security
(Master thesis, 2020)Den økte bruken av informasjonsteknologi (IT) i industrielle styringssystemer (ICS) utsetter ICS for tidligere ukjente trusler. Følgelig har cybersikkerhet blitt en del av barrierestyringen som er ansvarlig for å ivareta ... -
A General Formalism for Defining and Detecting OpenFlow Rule Anomalies
(Chapter, 2017)SDN network's policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting ... -
A General Framework for Multiparty Computations
(Doctoral Theses at NTNU, 1503-8181; 2012:143, Doctoral thesis, 2012)Multiparty computation is a computation between multiple players which want to compute a common function based on private input. It was first proposed over 20 years ago and has since matured into a well established science. ... -
A graph theoretical approach to online predator detection
(Master thesis, 2022)Mange barn bruker mye tid på nettet, enten de ser på videoer, spiller spill eller snakker med venner eller fremmede over sosiale medier. Mange ulike plattformer er skapt med barn som målgruppe. Dette har muliggjort at barn ... -
A holistic approach to email security
(Master thesis, 2019)E-post er involvert i en overveldende andel av alle cyberangrep. E-poststandardene er gamle og usikre, og kan enkelt forfalskes, avlyttes eller modifiseres av en ondsinnet aktør. Et stort utvalg av sikkerhetstiltak har ... -
A Hybrid Tool-Chain for Detecting Malware on Android
(Master thesis, 2020)Mobiler har de siste tiårene fått en viktig i rolle i samfunnet og i hverdagslivet. I dag blir mobiler brukt i samtlige kritiske funksjoner, som blant annet helse, bank og arbeidsoppgaver. Denne utviklingen har også medført ... -
A machine learning approach to detecting malware in TLS traffic using resilient network features
(Master thesis, 2019)The growth of malware utilizing encrypted channels makes it challenging to detect malicious activity using current Network Intrusion Detection Systems (NIDSs). The current network intrusion detection systems utilize pattern ... -
A Measurement-Driven Approach to Understand Urban Greenhouse Gas Emissions in Nordic Cities
(Journal article, 2016)Cities are main drivers for climate change mitigation and emission reduction today. However, in many cases they lack reliable baselines of emissions to validate current developments over time, assess the impact of their ... -
A method for approximate matching in intrusion detection systems using an extended bit-parallel algorithm
(Master thesis, 2020)Flere av dagens innbruddsdeteksjonssystemer baserer seg på eksakt mønstergjenkjenning for å oppdage trusler. Algoritmer som Aho-Corasick er foretrukne siden de prosesserer flere mønstre om gangen, noe som gjør dem i stand ... -
A modeling approach for dependability analysis of smart distribution grids
(Chapter, 2018)The distribution grids are among the most critical infrastructures which integrates advanced control and communication technologies atop of power systems. This paper presents a comprehensive modeling framework suited to ...