Now showing items 1-20 of 2536

    • 

      Fredrik Morten Sætran (Master thesis, 2019)
      The more sophisticated tools and methods used by attackers has forced the computer security industry to look for improved security controls. Malicious software is often used as a tool for frequent and costly computer ...
    • 0-RTT Key Exchange with Full Forward Secrecy 

      Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian (Chapter, 2017)
      Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ...
    • 2) Cloud Radio Access Networks (C-RAN) and optical Mobile backhaul and fronthaul 

      Hailu, Dawit Hadush (Master thesis, 2016)
      Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, ...
    • 3-D Face Morphing Attacks: Generation, Vulnerability and Detection 

      Singh, Jag Mohan; Ramachandra, Raghavendra (Journal article; Peer reviewed, 2024)
      Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction ...
    • A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness 

      Ask, Torvald Fossåen; Kullman, Kaur; Sütterlin, Stefan; Knox, Benjamin James; Engel, Don; Lugo, Ricardo Gregorio (Journal article; Peer reviewed, 2023)
      Background: Cyber defense decision-making during cyber threat situations is based on human-to-human communication aiming to establish a shared cyber situational awareness. Previous studies suggested that communication ...
    • 4G Nett: En teknisk og økonomisk analyse 

      Neuenkirchen, Jan Henrik (Master thesis, 2011)
      Denne masteroppgaven har tatt for seg ulik tematikk tilknyttet fjerde generasjons (4G) nettverk. Temaene som har blitt behandlet er både av teknisk og økonomisk art. I starten av oppgaven har de tidligere nettverkene, fra ...
    • 5G and the future of mobile network operato 

      Fosse, Ole Kristian Håkonsen (Master thesis, 2022)
      Målet med denne oppgaven var å forstå hvordan 5G endrer telekomindustrien. Oppgaven gir en oversikt over teknologien som muliggjør noen av casene som vil bli diskutert. Det vil være en del teori om forretningsøkosystemer ...
    • 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept 

      Haga, Simen; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2020)
      The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ...
    • 5G Network Slicing as an Enabler for Smart Distribution Grid Operations 

      Mendis, Handunneththi V. Kalpanie; Heegaard, Poul Einar; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The power distribution grid has to undergo substantial modifications in order to meet the future electricity needs. The increased flexibility in power consumption, local production and storage insist on smarter supervisory ...
    • 5G Network Slicing for Wi-Fi Networks 

      Nerini, Mateo; Palma, David (Journal article, 2021)
      Future networks will pave the way for a myriad of applications with different requirements and Wi-Fi will play an important role in local area networks. This is why network slicing is proposed by 5G networks, allowing to ...
    • A Basic Result on the Superposition of Arrival Processes in Deterministic Networks 

      Jiang, Yuming (Chapter, 2018)
      Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ...
    • A Case Study of a National Open Access Network in Norway 

      Thygesen, Ørjan Bøe (Master thesis, 2015)
      Due to changes in the problem description during the work on this thesis, a more precise title to this thesis would be: "A Comparative Study of The Internet Access Markets in Norway and Sweden - Open Access Networks versus ...
    • A Case Study of Usability Design in Ocean for Petrel Development at Schlumberger Information Solutions. 

      Flataker, Linn Veronica (Master thesis, 2009)
      AbstractSchlumberger is a service oilfield provider company which also develops their own software for their clients. They are in the special situation where they have developers who develop an API, which is then used to ...
    • A Comparison between Business Process Management and Information Security Management 

      Wangen, Gaute; Snekkenes, Einar (Chapter, 2014)
      Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ...
    • A comparison of sequence models for anomaly detection on process chains 

      Jørstad, Peter B Skramstad (Master thesis, 2023)
      Abstrakt: Denne studien undersøker anvendelsen av maskinlæringsteknikker i verts-baserte Intrusion Detection Systems (HIDS), med fokus på analysen av prosessforhold, et underutforsket område i HIDS-forskning. Gjennom en ...
    • A Computational Forensic Approach to the Analysis of Questioned Document Fragments 

      Chanda, Sukalpa (Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2015, Doctoral thesis, 2015-05-29)
      Fragments of documents are common subjects in forensic analysis of questioned documents. Forensic analysis of torn document is more challenging owing to sparse data content; for example, a document fragment might consist ...
    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A Constructive Approach to Support the Design of State Machines 

      Gisnås, Øystein (Master thesis, 2006)
      The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ...
    • A Context-Aware System to Communicate Urgency Cues to Health Care Workers 

      Wei, Qi (Master thesis, 2014)
      When nurses receive calls on their mobile phones, they need to decide whether to engage in the callor not. Several contextual factors play a role in making this decision. For example, if a nurse is busywith another patient ...