• A Study of Applied Passive TLS Analysis 

      Torbjørnsen, Anders Sefjord (Master thesis, 2018)
      While the Internet is moving towards more and more encryption of the network traffic, it is also a trend that is picked up by authors of malware. The traditional way of detecting malicious traffic or malicious behaviour ...
    • Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic 

      Shalaginov, Andrii (Doctoral theses at NTNU;2018:57, Doctoral thesis, 2018)
      Abstract Cyber Crime Investigators are challenged by the huge amount and complexity of digital data seized in criminal cases. Human experts are present in the Court of Law and make decisions with respect to the digital ...
    • Automated Authentication of Audiovisual Contents: A Biometric Approach 

      Khodabakhsh, Ali (Doctoral theses at NTNU;2021:213, Doctoral thesis, 2021)
      Following the introduction of image manipulation tools such as Adobe Photoshop in the early 2000s, the public trust in image authenticity dropped and the need for the development and deployment of image authentication ...
    • Cryptography for Innovative Blockchain Services 

      Raikwar, Mayank (Doctoral theses at NTNU;2022:241, Doctoral thesis, 2022)
      Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has been thriving. Much work has been carried out for blockchain use cases in different industrial areas such as healthcare, ...
    • Cyberpower Praxis: A Study of Ways to Improve Understanding and Governance in the Cyber Domain 

      Knox, Benjamin James (Doctoral theses at NTNU;2020:153, Doctoral thesis, 2020)
      Powerful effects arriving through cyberspace present real-world shared problems that cannot be foreseen. This thesis acknowledges the modern-day Faustian Bargain of staying digitally dependent, staying vulnerable presented ...
    • Cybersecurity Training for Critical Infrastructure Protection 

      Chowdhury, Nabin (Doctoral theses at NTNU;2023:13, Doctoral thesis, 2023)
      Critical Infrastructures (CIs) are defined as the ensemble of assets that are essential for the functioning of a society and economy. As suggested by their namesake, they cover a key role in many of today’s developed and ...
    • Dependence Control in Wireless Communication 

      Sun, Fengyou (Doctoral theses at NTNU;2020:10, Doctoral thesis, 2020)
      In the physical world, the system components or the system states are probabilistically related to each other spatially and temporally. This kind of relation is termed stochastic dependence or dependence, which is described ...
    • Digital Forensic Usage of the Inherent Structures in NTFS 

      Karresand, Nils Martin Mikael (Doctoral theses at NTNU;2023:171, Doctoral thesis, 2023)
      Digital forensic investigators have for a long time been burdened by an increasing amount of data to handle. Many solutions have been proposed. A yet unexplored feature is to use the inherent structures left by the allocation ...
    • Efficient Allocation of Resources in NFV-Enabled Networks 

      Woldeyohannes, Yordanos Tibebu (Doctoral theses at NTNU;2020:399, Doctoral thesis, 2020)
      The network traffic and number of devices that are connected within a network are increasing, driven by the increase in network coverage as well as the types of network services provisioned. The provisioning of network ...
    • Fair Local Resource Management in Mobile Social Networks 

      Mao, Zhifei (Doctoral theses at NTNU;2018:272, Doctoral thesis, 2018)
      As 5G made its global debut at the Winter Olympics in Pyeongchang, the world is one step closer to its mass commercial deployments. However, the practical application of 5G will be limited to dense urban areas due to ...
    • Forensic triage of digital evidence from the Internet of Things 

      Sandvik, Jens-Petter Skjelvåg (Doctoral theses at NTNU;2024:342, Doctoral thesis, 2024)
      The Internet of Things (IoT) has long been a popular topic that has led to numerous commercial innovations and products in a wide range of fields. As the number of deployed IoT systems worldwide rises, these systems should ...
    • From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange 

      de Kock, Bastiaan Borgert (Doctoral theses at NTNU;2023:201, Doctoral thesis, 2023)
      Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. ...
    • Malware detection and classification using low-level features 

      Banin, Sergii (Doctoral theses at NTNU;2023:11, Doctoral thesis, 2023)
      Nowadays, computers and computer systems are involved in most areas of our lives. Employees and users of manufacturing and transportation, banking and healthcare, education, and entertainment rely on computers and networks ...
    • Network Slicing in Beyond 5G: Implementation, Isolation, and Coexistence 

      Esmaeily, Ali (Doctoral theses at NTNU;2023:407, Doctoral thesis, 2023)
      The contemporary landscape of telecommunications is defined by the advent of Fifth Generation (5G) and the tantalizing promise of Beyond 5G (B5G) networks. 5G and B5G networks are the keys to fulfilling a massive number ...
    • Networking Impact and Support for Blockchains 

      Gebraselase, Befekadu Gezaheng (Doctoral theses at NTNU;2023:44, Doctoral thesis, 2023)
      With the rapid development of information and communication technologies, infrastructures, resources, and networking applications, systems have become complex and heterogeneous. This also creates a massive amount of data ...
    • Online Grooming Detection on Social Media Platforms 

      Borj, Parisa Rezaee (Doctoral theses at NTNU;2023:111, Doctoral thesis, 2023)
      Online grooming detection has become a critical research topic in the era of extensive data analysis. It is essential to protect vulnerable users, particularly adolescents, against sexual predation on online platforms and ...
    • Opportunities of Insecurity Refactoring for Training and Software Development 

      Schuckert, Felix (Doctoral theses at NTNU;2024:106, Doctoral thesis, 2024)
      Teaching software security is complex and should involve practical exercises. Practical exercises require software artifacts and projects that contain vulnerabilities. The vulnerabilities can be exploited to understand ...
    • Post-Quantum Secure Biometric Systems 

      Bauspieß, Pia Victoria (Doctoral theses at NTNU;2024:226, Doctoral thesis, 2024)
      Biometrics, which is defined as the automated recognition of individuals based on their behavioural and biological characteristics, can be applied to increase the trust and usability of digital interactions. Due to their ...
    • Presentation Attack Resistant Fingerprint Biometrics –using Optical Coherence Tomography 

      Sousedik, Ctirad (Doctoral theses at NTNU;2018:17, Doctoral thesis, 2018)
    • Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz (Doctoral theses at NTNU;2024:83, Doctoral thesis, 2024)
      Digital security uses traditional authentication mechanisms to verify the identity of an entity or a user who seeks access to a system, service, or application. Such authentication mechanisms verify user identity only at ...