Institutt for informasjonssikkerhet og kommunikasjonsteknologi: Nye registreringer
Viser treff 81-100 av 2626
-
Securing API Authentication and Authorisation with Integration of Digital Identities
(Bachelor thesis, 2024)APIer er essensielle for moderne programvareapplikasjoner, men er sårbare for cyberangrep på grunn av deres eksponering av applikasjonslogikk og data. Denne rapporten fokuserer på å forbedre API-sikkerheten ved å samle ... -
From Advertising to Intelligence: Investigating Tracking through Mobile Devices
(Bachelor thesis, 2024)Mobiltelefoner har blitt en forlengelse av oss selv i vårt daglige liv, og tilbyr en rekke funksjoner som gjør livene våre enklere og mer underholdende. Det finnes imidlertid en bakside; telefonene samler kontinuerlig inn ... -
Securing data integrity: Raspberry Pi-based anti-tampering system with Zymbit Protokit and Zymkey module
(Bachelor thesis, 2024)Høysensitiv informasjon lagret på en enhet kan være et verdifullt mål for hackere eller en fremmed stat. For å forhindre at angripere får tilgang til denne informasjonen, er det avgjørende å sikre enheten. Denne oppgaven ... -
Humanoid Robots as Learning Assistants? Useability Perspectives of Grade 6 Students
(Journal article; Peer reviewed, 2024)Despite the increasing number of robots in educational settings, they are relatively new, with ambiguous research findings regarding a robot’s influence on students’ learning, psychosocial aspects, and gender differences. ... -
An Intelligent User Plane to Support In-Network Computing in 6G Networks
(Chapter, 2023)Driven by the development of programmable networking hardware, In-network Computing (INC) has gained a considerable amount of attention in recent years. However, INC has so far barely been studied in the context of mobile ... -
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
(Journal article; Peer reviewed, 2023)Cryptographic voting protocols have recently seen much interest from practitioners due to their (planned) use in countries such as Estonia, Switzerland, France, and Australia. Practical protocols usually rely on tested ... -
Neuroergonomic Approaches to Understanding and Improving Communication of Recognized Cyber Threat Situations
(Doctoral theses at NTNU;2024:278, Doctoral thesis, 2024)Cyber threat situations entail high-stake decision-making processes both within organizations and between the affected organization and external entities. During cyber threat situations, information is shared between ... -
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space
(Journal article; Peer reviewed, 2023)Nowadays, assets in space are vital for the provision of critical societal functions such as transportation, communication, production and supply of food, agriculture, etc. The increasing adoption of services provided by ... -
Hybrid Group Key Exchange with Application to Constrained Networks
(Peer reviewed; Journal article, 2023)We expand the security model for group key exchange of Poettering et al. (CT-RSA 2021) to allow for more fine-tuned reveal of both state and keying material. The expanded model is used to analyse the security of hybrid ... -
Honey-list based authentication protocol for industrial IoT swarms
(Peer reviewed; Journal article, 2023)Industrial Internet of Things (IIoT) systems are advanced IoT systems composed of sensor devices supported with dynamic objects such as smart vehicles and drones. The collaboration among static and heterogeneous mobile ... -
Reliability validation enabling framework (RVEF) for digital forensics in criminal investigations
(Journal article; Peer reviewed, 2023)This paper proposes a formal reliability validation enabling framework (RVEF) for evaluation of digital forensics in criminal investigations. The RVEF is informed by examined theoretical and conceptual gaps between law and ... -
Container-Based IoT Architectures: Use Case for Visual Person Counting
(Chapter, 2023)This paper studies the deployment process for a use case of visual person counting from cameras located in outdoor areas and shows how a containerized solution fulfills the particular requirements for the use case, ... -
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey
(Peer reviewed; Journal article, 2023)Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) protocol ... -
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
(Journal article; Peer reviewed, 2023)Due to the high adoption of cloud services, the protection of data and information is critical. Cloud service customers (CSCs) need help to obtain the authoritative assurances required for the cloud services and negotiate ... -
Speaking the Same Language Through Logic and Ontologies
(Master thesis, 2024)In recent years, with the development of technologies such as Software-Defined Networking, Network Function Virtualization and Infrastructure as Code (IaC), modern Information and Communication Technology infrastructures ... -
UoCAD: An Unsupervised Online Contextual Anomaly Detection Approach for Multivariate Time Series from Smart Homes
(Chapter, 2024)In the context of time series data, a contextual anomaly is considered an event or action that causes a deviation in the data values from the norm. This deviation may appear normal if we do not consider the timestamp ... -
How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?
(Chapter, 2021)Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion detection, etc. ... -
Value of Information in Wireless Sensor Network Applications and the IoT: A Review
(Journal article; Peer reviewed, 2022)Value of Information (VoI) is a concept to assess the usefulness of information for a specific goal, and has in the last decade experienced a growing interest also for Wireless Sensor Network (WSN) applications and the ... -
Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims
(Journal article; Peer reviewed, 2023)Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users ...