Viser treff 21-40 av 2522

    • A Call for Mandatory Input Validation and Fuzz Testing 

      Køien, Geir Myrdahl; Øverlier, Lasse (Journal article; Peer reviewed, 2023)
      The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and ...
    • BRAKE: Biometric Resilient Authenticated Key Exchange 

      Silde, Tjerand Aga; Bauspieß, Pia; Costache, Anamaria; Poljuha, Matej; Tullot, Alexandre; Rathgeb, Christian; Kolberg, Jascha; Busch, Christoph (Journal article; Peer reviewed, 2024)
      Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared ...
    • Case study analysis: Insider incidents at Volvo, Scania, Den Norske Veritas (DNV), the Swedish Security Service (SÄPO) and the Swedish Military Intelligence 

      Mahmood, Aftab (Master thesis, 2023)
      Denne oppgaven omhandler innsidetrusselen relatert til statlige aktører som rekrutterer mennesker, til innhenting av informasjon som ellers ikke hadde vært tilgjengelig. Denne angrepsvektoren er godt beskrevet og gjort ...
    • Towards a Methodology to Assess Quality of 5G Slicing 

      Grøsvik, Sebastian Gilje (Master thesis, 2023)
      Skivedeling av nettverk muliggjøre at flere tjenester og applikasjoner med ulike ytelseskrav kan operere parallelt på en delt nettverksinfrastruktur. Ved å benytte programvaredefinert nettverk (SDN) og nettverksfunksjons ...
    • Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives 

      Ystgaard, Kaja Fjørtoft; Kløften Lein, Silje; De Moor, Katrien Rachel W (Chapter, 2024)
      This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ...
    • Multi-class hate speech detection in the Norwegian language using FAST-RNN and multilingual fine-tuned transformers 

      Hashmi, Ehtesham; Yildirim-Yayilgan, Sule (Journal article; Peer reviewed, 2024)
      The growth of social networks has provided a platform for individuals with prejudiced views, allowing them to spread hate speech and target others based on their gender, ethnicity, religion, or sexual orientation. While ...
    • Interpretation of File System Metadata in a Criminal Investigation Context 

      Nordvik, Rune (Doctoral theses at NTNU;2024:115, Doctoral thesis, 2024)
      The reliable reconstruction of digital events is imperative for solving criminal cases. Computers, servers, mobile and IoT devices, vehicles, and EV charging infrastructure all use either local or remote storage (cloud). ...
    • Cyber Risk Assessment For Ships (CRASH) 

      Oruc, Aybars; Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)
    • Analyzing Privacy in Software 

      Tang, Feiyang (Doctoral theses at NTNU;2024:82, Doctoral thesis, 2024)
      In our increasingly digital world, a pressing concern emerges: How do we secure our privacy as we increasingly depend on software? As we navigate through apps and platforms, the complexities of data privacy become evident. ...
    • Behavior as a Function of Video Quality in an Ecologically Valid Experiment 

      Wanat, Dominika; Janowski, Lucjan; de Moor, Katrien Rachel W (Chapter, 2023)
      Most user studies in the QoE multimedia domain are done by asking users about quality. This approach has advantages: it obtains many answers and reduces variance by repeated measurements. However, the results obtained in ...
    • Quality Assessment of Video Services in the Long Term 

      Cieplínska, Natalia; Janowski, Lucjan; de Moor, Katrien Rachel W (Chapter, 2023)
      In traditional subjective video quality experiments, the presented sequences are short and quality ratings are based on a single interaction with a service (i.e., one session). However, in real-life scenarios, users interact ...
    • Investigating Motivational Factors Influencing Users’ Consumption of Video Streaming Services: A Human Factor Perspective 

      Subramanian, Sruti; de Moor, Katrien Rachel W; Koniuch, Kamil (Chapter, 2023)
      This paper presents comprehensive findings obtained from an online survey focused on understanding the motivational factors influencing users’ consumption of video streaming services from a human factors perspective. The ...
    • Age-Inclusive Design of Video Streaming Services: Integrating Insights and Design Implications 

      Subramanian, Sruti; de Moor, Katrien Rachel W (Chapter, 2023-11)
      With the rapid growth of video streaming services, understanding user needs, preferences, and behaviors has become crucial. However, older adults, are a significant yet often overlooked user segment, have received limited ...
    • Low complexity subspace approach for unbiased frequency estimation of a complex single-tone 

      Pourafzal, Alireza; Škrabánek, Pavel; Cheffena, Michael; Yildirim, Sule; Roi-Taravella, Thomas (Journal article, 2024)
      We propose a single-tone frequency estimator of a one-dimensional complex signal in complex white Gaussian noise. The estimator is based on the subspace approach and the unitary transformation. Due to its low space and ...
    • Comparing the Scalability of Communication Networks and Systems 

      Hossfeld, Tobias; Heegaard, Poul Einar; Kellerer, Wolfgang (Journal article; Peer reviewed, 2023)
      Scalability is often mentioned in literature, but a stringent definition is missing. In particular, there is no general scalability assessment which clearly indicates whether a system scales or not or whether a system ...
    • IRL-Net: Inpainted Region Localization Network via Spatial Attention 

      Daryani, Amir Etefaghi; Mirmahdi, Mahdieh; Hassanpour, Ahmad; Shahreza, Hatef Otroshi; Yang, Bian; Fierrez, Julian (Journal article; Peer reviewed, 2023)
      Identifying manipulated regions in images is a challenging task due to the existence of very accurate image inpainting techniques leaving almost unnoticeable traces in tampered regions. These image inpainting methods can ...
    • Privacy-Preserving Continuous Authentication 

      Baig, Ahmed Fraz (Doctoral theses at NTNU;2024:83, Doctoral thesis, 2024)
      Digital security uses traditional authentication mechanisms to verify the identity of an entity or a user who seeks access to a system, service, or application. Such authentication mechanisms verify user identity only at ...
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...
    • Character-based Writer Verification of Ancient Hebrew Square-script Manuscripts: On Edge-direction Feature 

      Tobing, Tabita; Skrabánek, Pavel; Yildirim-Yayilgan, Sule; George, Sony; Elgvin, Torleif (Journal article, 2023)
      Handwriting significantly contributes to the task of the writer identification and verification of modern and historical documents. This work developed a writer verification system for ancient Hebrew square-script manuscripts, ...
    • Smart Homes: A security threat in disguise 

      Licina, Amar (Master thesis, 2023)
      I de senere årene har den raske veksten av (IoT)-teknologier som har erstattet tradisjonelle husholdning enheter og lovet å tilby enestående bekvemmelighet gjennom smarte hjemmeenheter. Disse IoT-enhetene blir en vanlig ...