Institutt for informasjonssikkerhet og kommunikasjonsteknologi
Nye registreringer
-
Towards a Maturity Improvement Process – Systemically Closing the Socio-Technical Gap
(Peer reviewed; Journal article, 2020)In this paper we present ongoing research into escalation maturity measurements of organizations. We outline how to integrate a socio-technical approach and LIFT-methodology to improve the escalation maturity improvement ... -
Personal Task Design Preferences of Crowdworkers
(Peer reviewed; Journal article, 2020)The following topics are dealt with: quality of experience; virtual reality; video streaming; data compression; video coding; learning (artificial intelligence); video signal processing; computer games; human factors; Internet. -
Influence of Gender and Viewing Frequency on Quality of Experience
(Peer reviewed; Journal article, 2020)Some of the most important aspects for content creators and service providers are the content appeal and the time consumed by the end users on a particular application or service. Gender and age can influence the Quality ... -
Preparing for cyber crisis management exercises
(Chapter, 2020)In this paper the authors discuss how to create a preparation schedule for ex-ercises (PSE) to support EXCON-teams and instructors for full-scaled com-bined crisis management and cyber-exercises. The process to create the ... -
Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point
(Chapter, 2021)Recently it has been shown, that it is possible to detect malware based on the memory access patterns produced before executions reaches its Entry Point. In this paper, we investigate the usefulness of memory access patterns ... -
Cross-lingual Speaker Verification: Evaluation On X-Vector Method
(Chapter, 2021)Automatic Speaker Verification (ASV) systems accuracy is based on the spoken language used in training and enrolling speakers. Language dependency makes voice-based security systems less robust and generalizable to a wide ... -
Multilingual Voice Impersonation Dataset and Evaluation
(Chapter, 2021)Well-known vulnerabilities of voice-based biometrics are impersonation, replay attacks, artificial signals/speech synthesis, and voice conversion. Among these, voice impersonation is the obvious and simplest way of attack ... -
An Ontological Framework to Facilitate Early Detection of ‘Radicalization’ (OFEDR)—A Three World Perspective
(Peer reviewed; Journal article, 2021)This paper presents an ontology that involves using information from various sources from different disciplines and combining it in order to predict whether a given person is in a radicalization process. The purpose of the ... -
Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification
(Peer reviewed; Journal article, 2021)Skin cancer is a major public health problem, with millions newly diagnosed cases each year. Melanoma is the deadliest form of skin cancer, responsible for the most over 6500 deaths each year in the US, and the rates have ... -
Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
(Peer reviewed; Journal article, 2021)Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. Amidst the classically used biometrics, voice and face attributes are the most ... -
Cyber Security Training for Critical Infrastructure Protection: a Literature Review
(Peer reviewed; Journal article, 2021)Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted ... -
Crime Intelligence from Social Media Using CISMO
(Peer reviewed; Journal article, 2020)Nowadays, online social networks (OSNs) are being used as a hosting ground for criminal activities, and the legal enforcement agencies (LEAs) are struggling to process and analyse the huge amount of data coming from these ... -
Neural Adaptive Caching Approach for Content Delivery Networks
(Peer reviewed; Journal article, 2019) -
Local voting: A new distributed bandwidth reservation algorithm for 6TiSCH networks
(Peer reviewed; Journal article, 2020)The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy ... -
Legal requirements toward enhancing the security of medical devices
(Peer reviewed; Journal article, 2020)Over 25 million Americans are dependent on medical devices. However, the patients who need these devices only have two choices, thus the choice between using an insecure critical-life-functioning devices or the choice to ... -
Study of Blacklisted Malicious Domains from a Microsoft Windows End-user Perspective: Is It Safe Behind the Wall?
(Peer reviewed; Journal article, 2020)The Internet is a dangerous place, _lled with di_erent cyber threats, including malware. To withstand this, blacklists have been utilized for a long time to block known infection and delivery sources. However, through ... -
Privacy Preserving Passive DNS
(Peer reviewed; Journal article, 2020)The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and ... -
PassGAN for Honeywords: Evaluating the Defender and the Attacker Strategies
(Chapter, 2020)The main challenge in a honeywords system is how to generate artificial passwords (honeywords) that are indistinguishable from the genuine password (sugarword). It is straightforward to consider the PassGAN for generating ... -
A Generalizable Deepfake Detector based on Neural Conditional Distribution Modelling
(Chapter, 2020)Photo- and video-realistic generation techniques have become a reality following the advent of deep neural networks. Consequently, there are immense concerns regarding the difficulty in differentiating what content is real ...