Viser treff 1-20 av 1955

    • Windows Security Baselines 

      Mads Reneflot Moe; Mats Nerhagen (Bachelor thesis, 2022)
      I cyber-sikkerhet i dag er ondsinnede aktører og angrepsmetodene de bruker under konstant utvikling for å finne nye og kreative måter på å tilegne seg uautorisert tilgang til IT systemer. Ettersom disse trusslene utvikler ...
    • Windows Server 2019/2022 and Azure Cloud security systems - A general recommendation 

      Rise, Helleik Rabba; Engen, Stian (Bachelor thesis, 2022)
      Organisasjoner i dag har mange cybertrusler som de bør være oppmerksomme på og som de bør aktivt beskyttes imot. Det er mange sikkerhetsfunksjoner som er viktige å bruke for å aktivt beskytte seg imot disse sikkerhetstru ...
    • Auspex 

      Andresen, Peder Hovdan; Eilert, Patrick Krosby; Westby, Anders Christoffer (Bachelor thesis, 2022)
      Telenor, en av de ledende telekommunikasjonsselskapene i Norge, tilbyr et bredt spekter av tjenester. Mange av disse tjenestene er avhengige av mikrotjenester som kjører i Docker containere. Av denne grunn har Telenor behov ...
    • Automatisk utrulling og konfigurasjon av virtuelle maskiner i et skymiljø 

      Marstrander, Kristian; Mølnvik, Kjetil; Ovenstad, Emil August Tollefsen; Skjesol, Halfdan Moesgaard (Bachelor thesis, 2022)
      HDO drifter og forvalter norges medisinske nødmeldetjeneste. De er i besittelse av en virtualiseringsplattform med teknologi som ESXI og vSphere. Etterspørsel etter nye VMer har økt og krever mye arbeid å opprette manuelt. ...
    • AWS Landing Zone 

      Emmerhoff, Kasper; Salyga, Luka; Wessel, Sander (Bachelor thesis, 2022)
      Bedriften Tietoevry trengte en landingsone for AWS, altså ønsket de et design av en fundamental infrastruktur i et skymiljø. Dette designet vil være et standarisert rammeverk, brukt for å redusere tiden ved implementasjon ...
    • Kubernetes in VMware and NSX-T 

      Abraha, Abel Weldu; Zerai, Mehari Berhe; Rihan, Mohammed Anas (Bachelor thesis, 2022)
      Skiftet fra monolittisk arkitektur til mikrotjeneste arkitektur har ført til økt bruk av kontainere. Som et resultat består dagens applikasjonsstakker ofte av mange kontainere, noe som igjen har forårsaket behovet for et ...
    • Secure Communication with WireGuard – VPN-as-a-Service in Beyond 5G 

      Kielland, Sondre Sørensen (Master thesis, 2022)
      Innføring av skivedeling i 5G nettverk åpner for at vertikale virksomheter kan utvikle og benytte sine tjenester ved siden av hverandre i telenett. Sammenliknet med tidligere generasjons mobilnettverk, søker 5G å kunne ...
    • Using Formal Methods for Modelling Cyber-Physical Systems Security 

      Nweke, Livinus Obiora (Doctoral theses at NTNU;2022:169, Doctoral thesis, 2022)
      The recent years have witnessed an increasing integration of physical systems with information and communication technology (ICT). This emerging field is usually referred to as cyber-physical systems (CPS) and has generated ...
    • Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging 

      Auksorius, Egidijus; Raja, Kiran; Topcu, Berkay; Ramachandra, Raghavendra; Busch, Christoph; Boccara, Claude A (Peer reviewed; Journal article, 2020)
      Conventional fingerprint sensors that are deployed in real-life applications lack the ability to peer inside a finger beyond the external surface. Subsurface information can provide complimentary biometric characteristics ...
    • Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey 

      Kavallieratos, Georgios; Katsikas, Sokratis; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services. As safety and security have ...
    • Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid 

      Zerihun, Tesfaye Amare; Garau, Michele; Helvik, Bjarne Emil (Peer reviewed; Journal article, 2020)
      Information and Communication Technologies (ICT), Wide Area Measurement Systems (WAMS) and state estimation represent the key-tools for achieving a reliable and accurate knowledge of the power grid, and represent the ...
    • SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture 

      Radoglou-Grammatikis, Panagiotis; Sarigiannidis, Panagiotis; Dalamagkas, Christos; Spyridis, Yannis; Lagkas, Thomas; Efstathopoulos, Georgios; Sesis, Achilleas; Labrador Pavon, Ignacio; Trapero Burgos, Ruben; Diaz, Rodrigo; Sarigiannidis, Antonios; Papamartzivanos, Dimitris; Menesidou, Sofia Anna; Ledakis, Giannis; Pasias, Achilleas; Kotsiopoulos, Thanasis; Drosou, Anastasios; Mavropoulos, Orestis; Colet Subirachs, Alba; Paradell Sola, Pol; Domínguez-García, Jose Luis; Escalante, Marisa; Martin Alberto, Molinuevo; Caracuel, Benito; Ramos, Francisco; Gkioulos, Vasileios; Katsikas, Sokratis; Bolstad, Hans Christian; Archer, Dan-Eric; Paunovic, Nikola; Gallart, Ramon; Rokkas, Theodoros; Arce, Alicia (Peer reviewed; Journal article, 2021)
      The technological leap of smart technologies and the Internet of Things has advanced the conventional model of the electrical power and energy systems into a new digital era, widely known as the Smart Grid. The advent of ...
    • Bloom’s Learning Outcomes’ Automatic Classification Using LSTM and Pretrained Word Embeddings 

      Shaikh, Sarang; Daudpotta, Sher Muhammad; Imran, Ali Shariq (Peer reviewed; Journal article, 2021)
      Bloom’s taxonomy is a popular model to classify educational learning objectives into different learning levels for three domains including cognitive, affective and psycho motor. Each domain is further detailed into different ...
    • Lex-pos feature-based grammar error detection system for the English language 

      Agarwal, Nancy; Wani, Mudasir Ahmad; Bours, Patrick (Peer reviewed; Journal article, 2020)
      This work focuses on designing a grammar detection system that understands both structural and contextual information of sentences for validating whether the English sentences are grammatically correct. Most existing systems ...
    • Managing Cyber Security Risks of the Cyber-Enabled Ship 

      Kavallieratos, Georgios; Katsikas, Sokratis (Peer reviewed; Journal article, 2020)
      One aspect of the digital transformation process in the shipping industry, a process often referred to as Shipping 4.0, is the increased digitization of on board systems that goes along with increased automation in and ...
    • Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges 

      Yamin, Muhammad Mudassar (Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)
      Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ...
    • Tracing your smart-home devices conversations: A real world iot traffic data-set 

      Anagnostopoulos, Marios; Spathoulas, Georgios; Viaño, Brais; Augusto-Gonzalez, Javier (Peer reviewed; Journal article, 2020)
      Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference ...
    • Risk Perceptions on Social Media Use in Norway 

      Nyblom, Philip Johannes Brugmans; Wangen, Gaute; Gkioulos, Vasileios (Peer reviewed; Journal article, 2020)
      Social media are getting more and more ingrained into everybody’s lives. With people’s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy ...
    • Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets 

      Spathoulas, Georgios; Giachoudis, Nikolaos; Damiris, Georgios-Paraskevas; Theodoridis, Georgios (Peer reviewed; Journal article, 2019)
      Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ...
    • Light fields for face analysis 

      Galdi, Chiara; Chiesa, Valeria; Busch, Christoph; Correia, Paulo Lobato; Dugelay, Jean-Luc; Guillemot, Christine (Peer reviewed; Journal article, 2019)
      The term “plenoptic” comes from the Latin words plenus (“full”) + optic. The plenoptic function is the 7-dimensional function representing the intensity of the light observed from every position and direction in 3-dimensional ...