Now showing items 1-20 of 1851

    • 

      Fredrik Morten Sætran (Master thesis, 2019)
      The more sophisticated tools and methods used by attackers has forced the computer security industry to look for improved security controls. Malicious software is often used as a tool for frequent and costly computer ...
    • 0-RTT Key Exchange with Full Forward Secrecy 

      Günther, Felix; Hale, Britta; Jager, Tibor; Lauer, Sebastian (Chapter, 2017)
      Reducing latency overhead while maintaining critical security guarantees like forward secrecy has become a major design goal for key exchange (KE) protocols, both in academia and industry. Of particular interest in this ...
    • 2) Cloud Radio Access Networks (C-RAN) and optical Mobile backhaul and fronthaul 

      Hailu, Dawit Hadush (Master thesis, 2016)
      Increasing mobile data traffic due to the rise of both smartphones and tablets has led to high-capacity demand of mobile data network. To meet the ever-growing capacity demand and reduce the cost of mobile network components, ...
    • 4G Nett: En teknisk og økonomisk analyse 

      Neuenkirchen, Jan Henrik (Master thesis, 2011)
      Denne masteroppgaven har tatt for seg ulik tematikk tilknyttet fjerde generasjons (4G) nettverk. Temaene som har blitt behandlet er både av teknisk og økonomisk art. I starten av oppgaven har de tidligere nettverkene, fra ...
    • 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept 

      Haga, Simen; Esmaeily, Ali; Kralevska, Katina; Gligoroski, Danilo (Chapter, 2020)
      The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress ...
    • 5G Network Slicing as an Enabler for Smart Distribution Grid Operations 

      Mendis, Handunneththi V. Kalpanie; Heegaard, Poul Einar; Kralevska, Katina (Journal article; Peer reviewed, 2019)
      The power distribution grid has to undergo substantial modifications in order to meet the future electricity needs. The increased flexibility in power consumption, local production and storage insist on smarter supervisory ...
    • A Basic Result on the Superposition of Arrival Processes in Deterministic Networks 

      Jiang, Yuming (Chapter, 2018)
      Time-Sensitive Networking (TSN) and Deterministic Networking (DetNet) are emerging standards to enable deterministic, delay-critical communication in such networks. This naturally (re-)calls attention to the network calculus ...
    • A Case Study of a National Open Access Network in Norway 

      Thygesen, Ørjan Bøe (Master thesis, 2015)
      Due to changes in the problem description during the work on this thesis, a more precise title to this thesis would be: "A Comparative Study of The Internet Access Markets in Norway and Sweden - Open Access Networks versus ...
    • A Case Study of Usability Design in Ocean for Petrel Development at Schlumberger Information Solutions. 

      Flataker, Linn Veronica (Master thesis, 2009)
      AbstractSchlumberger is a service oilfield provider company which also develops their own software for their clients. They are in the special situation where they have developers who develop an API, which is then used to ...
    • A Comparison between Business Process Management and Information Security Management 

      Wangen, Gaute; Snekkenes, Einar (Chapter, 2014)
      Information Security Standards such as NIST SP 800-39 and ISO/IEC 27005:2011 are turning their scope towards business process security. And rightly so, as introducing an information security control into a business-processing ...
    • A Computational Forensic Approach to the Analysis of Questioned Document Fragments 

      Chanda, Sukalpa (Doktorgradsavhandlinger ved Høgskolen i Gjøvik;1/2015, Doctoral thesis, 2015-05-29)
      Fragments of documents are common subjects in forensic analysis of questioned documents. Forensic analysis of torn document is more challenging owing to sparse data content; for example, a document fragment might consist ...
    • A connectionless multicast protocol for MANETs 

      Thi Minh Do, Viet; Landmark, Lars; Kure, Øivind (2012 International Conference on Telecommunications and Multimedia (TEMU);, Chapter; Conference object; Peer reviewed; Journal article, 2012)
      In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast ...
    • A Constructive Approach to Support the Design of State Machines 

      Gisnås, Øystein (Master thesis, 2006)
      The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ...
    • A Context-Aware System to Communicate Urgency Cues to Health Care Workers 

      Wei, Qi (Master thesis, 2014)
      When nurses receive calls on their mobile phones, they need to decide whether to engage in the callor not. Several contextual factors play a role in making this decision. For example, if a nurse is busywith another patient ...
    • A Control System Providing a Dynamic Overview of Emergency Situations at Oil and Gas Processing Plants 

      Norberg, Frederik Seltveit (Master thesis, 2009)
      Oil and gas processing plants handle very large volumes of gases and liquids, many of which are both flammable and poisonous. Combined with the high pressures often involved as part of the processing, an accident has the ...
    • A Data Dissemination Protocol for Vehicles with Temporary Cellular Network Inaccessibility 

      Puka, Ergys; Herrmann, Peter (Chapter, 2019)
      The cellular network coverage in sparsely populated and mountainous areas is often patchy. That can be a significant impediment for services based on connections between vehicles and their environment. In this paper, we ...
    • A Demonstration on Service Compositions based on Natural Language Request and User Contexts 

      Sutthikulphanich, Kirati (Master thesis, 2008)
      The significant growth in mobile markets exposes business niches. A number of heterogeneous services have been offered to end users by several service providers. The end users can fully benefit from wide varieties of ...
    • A diagrammatic notation for modeling access control in tree-based data structures 

      Øslebø, Arne (Doctoral Theses at NTNU, 1503-8181; 2008:142, Doctoral thesis, 2008)
      This thesis describe two graphical modeling languages that can be used for specifying the access control setup in most systems that store information in a tree based structure. The Tree-based Access control Modeling ...
    • A Fault-Tolerant and Consistent SDN Controller 

      Kamisinski, Andrzej; Gonzalez, Andres Javier; Helvik, Bjarne Emil; Nencioni, Gianfranco (Chapter; Conference object; Peer reviewed, 2016)
      Software-Defined Networking (SDN) is a new paradigm that promises to enhance network flexibility and innovation. However, operators need to thoroughly assess its advantages and threats before they can implement it. Robustness ...