Viser treff 21-40 av 2517

    • Multi-class hate speech detection in the Norwegian language using FAST-RNN and multilingual fine-tuned transformers 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule (Journal article; Peer reviewed, 2024)
      The growth of social networks has provided a platform for individuals with prejudiced views, allowing them to spread hate speech and target others based on their gender, ethnicity, religion, or sexual orientation. While ...
    • Interpretation of File System Metadata in a Criminal Investigation Context 

      Nordvik, Rune (Doctoral theses at NTNU;2024:115, Doctoral thesis, 2024)
      The reliable reconstruction of digital events is imperative for solving criminal cases. Computers, servers, mobile and IoT devices, vehicles, and EV charging infrastructure all use either local or remote storage (cloud). ...
    • Cyber Risk Assessment For Ships (CRASH) 

      Oruc, Aybars; Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
    • Analyzing Privacy in Software 

      Tang, Feiyang (Doctoral theses at NTNU;2024:82, Doctoral thesis, 2024)
      In our increasingly digital world, a pressing concern emerges: How do we secure our privacy as we increasingly depend on software? As we navigate through apps and platforms, the complexities of data privacy become evident. ...
    • Age-Inclusive Design of Video Streaming Services: Integrating Insights and Design Implications 

      Subramanian, Sruti; de Moor, Katrien Rachel W (Chapter, 2023-11)
      With the rapid growth of video streaming services, understanding user needs, preferences, and behaviors has become crucial. However, older adults, are a significant yet often overlooked user segment, have received limited ...
    • Low complexity subspace approach for unbiased frequency estimation of a complex single-tone 

      Pourafzal, Alireza; Škrabánek, Pavel; Cheffena, Michael; Yildirim, Sule; Roi-Taravella, Thomas (Journal article, 2024)
      We propose a single-tone frequency estimator of a one-dimensional complex signal in complex white Gaussian noise. The estimator is based on the subspace approach and the unitary transformation. Due to its low space and ...
    • Comparing the Scalability of Communication Networks and Systems 

      Hossfeld, Tobias; Heegaard, Poul Einar; Kellerer, Wolfgang (Journal article; Peer reviewed, 2023)
      Scalability is often mentioned in literature, but a stringent definition is missing. In particular, there is no general scalability assessment which clearly indicates whether a system scales or not or whether a system ...
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Behavior as a Function of Video Quality in an Ecologically Valid Experiment 

      Wanat, Dominika; Janowski, Lucjan; de Moor, Katrien Rachel W (Chapter, 2023)
      Most user studies in the QoE multimedia domain are done by asking users about quality. This approach has advantages: it obtains many answers and reduces variance by repeated measurements. However, the results obtained in ...
    • Quality Assessment of Video Services in the Long Term 

      Cieplínska, Natalia; Janowski, Lucjan; de Moor, Katrien Rachel W (Chapter, 2023)
      In traditional subjective video quality experiments, the presented sequences are short and quality ratings are based on a single interaction with a service (i.e., one session). However, in real-life scenarios, users interact ...
    • Investigating Motivational Factors Influencing Users’ Consumption of Video Streaming Services: A Human Factor Perspective 

      Subramanian, Sruti; de Moor, Katrien Rachel W; Koniuch, Kamil (Chapter, 2023)
      This paper presents comprehensive findings obtained from an online survey focused on understanding the motivational factors influencing users’ consumption of video streaming services from a human factors perspective. The ...
    • Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz (Doctoral theses at NTNU;2024:83, Doctoral thesis, 2024)
      Digital security uses traditional authentication mechanisms to verify the identity of an entity or a user who seeks access to a system, service, or application. Such authentication mechanisms verify user identity only at ...
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...
    • Character-based Writer Verification of Ancient Hebrew Square-script Manuscripts: On Edge-direction Feature 

      Tobing, Tabita; Skrabánek, Pavel; Yildirim-Yayilgan, Sule; George, Sony; Elgvin, Torleif (Journal article, 2023)
      Handwriting significantly contributes to the task of the writer identification and verification of modern and historical documents. This work developed a writer verification system for ancient Hebrew square-script manuscripts, ...
    • Smart Homes: A security threat in disguise 

      Licina, Amar (Master thesis, 2023)
      I de senere årene har den raske veksten av (IoT)-teknologier som har erstattet tradisjonelle husholdning enheter og lovet å tilby enestående bekvemmelighet gjennom smarte hjemmeenheter. Disse IoT-enhetene blir en vanlig ...
    • Gamification of Incident Response Training for Small and Medium-Sized Businesses 

      Sivakumaran, Nireban (Master thesis, 2023)
      Denne avhandlingen utforsker rollen «gamification» har i å påvirke opplæring i beredskapsplanlegging, og trening for små og mellomstore bedrifter (SMB’er). Selv om fokuset er på SMB’er i Norge, kan funnene være anvendelige ...
    • Adoption of cybersecurity innovations – a systematic literature review 

      Vestad, Arnstein; Yang, Bian (Chapter, 2024)
      Adoption of cybersecurity capabilities in an organization can be seen as examples of adoption of technological innovations. While regulators use rules, standards and codes of practice to influence the state of cybersecurity ...
    • Moderating Respectful Conversations Using Reinforcement Q-Learning and Markov Decision Process Approaches 

      Hjelmtveit, Kevin (Master thesis, 2023)
      I en tid hvor digital kommunikasjon er dominerende, står vi overfor et økende problem med hatprat. Denne oppgaven tar for seg anvendelsen av forsterkende læringsteknikker, spesielt Markov-beslutningsprosesser (MDP) og ...
    • Early cyber-grooming detection: Combining the Sliding window and Continuous risk-metric methods 

      Stien, Trond. (Master thesis, 2023)
      Cyber-grooming er et økende problem. Gjennom bruk av moderne teknologi kan en overgriper få tilgang til barn som tidligere var utenfor overgriperens geografiske begrensende område. Problemet er ikke bare et samfunnsproblem, ...
    • Key Regions, Graphs, and Identity: Grouping Behavior Patterns to Unravel Shared Accounts 

      Nafeez Zawad Hossain (Master thesis, 2023)
      Kontodeling har blitt en vanlig forekomst i dagens tidsalder for digitale tjenester, noe som utgjør spesielle vanskeligheter for brukeridentifikasjon og tjenester rettet mot bestemte brukere. Konvensjonelle autentisering ...