Nye registreringer

  • Security Awareness of the Digital Natives 

    Gkioulos, Vasileios; Wangen, Gaute; Katsikas, Sokratis; Kavallieratos, George; Kotzanikolaou, Panayiotis (Journal article; Peer reviewed, 2017)
    Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. ...
  • Improving static audio keystroke analysis by score fusion of acoustic and timing data 

    Pleva, Matus; Bours, Patrick; Ondas, Stanislav; Juhár, Jozef (Journal article; Peer reviewed, 2017)
    In this paper we investigate the capacity of sound & timing information during typing of a password for the user identification and authentication task. The novelty of this paper lies in the comparison of performance between ...
  • An Initial Insight Into InfoSec Risk Management Practices 

    Wangen, Gaute (Journal article; Peer reviewed, 2015)
    Much of the debate surrounding risk management in information security (InfoSec) has been at the academic level, and how practitioners view predominant issues is an important element often left unexplored. Thus, this article ...
  • Team-Based Learning: A Practical Approach for an Engineering Class 

    Kraemer, Frank Alexander (Journal article, 2017)
    We describe the framework of Team-Based Learning and its application in an engineering course at NTNU. We present the process of applying TBL to a new course, discuss the results on the course outcome and close with some ...
  • All in a day's work: Password cracking for the rest of us 

    Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo (Chapter, 2009)
    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ...
  • Survey of Key Management in Ad Hoc Networks 

    Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål (Journal article; Peer reviewed, 2006)
    The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes ...
  • Conflicting Incentives Risk Analysis: A Case Study of the Normative Peer Review Process 

    Wangen, Gaute (Journal article; Peer reviewed, 2015)
    This paper presents an approach to conduct risk assessments of complex incentive systems, using a case study of the normative Peer Review Process (PRP). This research centers on appliances and adaptations of the Conflicting ...
  • Information Security Risk Assessment: A Method Comparison 

    Wangen, Gaute (Journal article; Peer reviewed, 2017)
    Numerous methods for information security risk assessment (ISRA) are available, yet there is little guidance on how to choose one. Through a comprehensive risk identification, estimation, and evaluation framework, the ...
  • Increasing the Lifetime of Roadside Sensor Networks Using Edge-Betweenness Clustering 

    Flathagen, Joakim; Drugan, Ovidiu Valentin; Engelstad, Paal Einar; Kure, Øivind (Journal article; Peer reviewed, 2011)
    Wireless Sensor Networks are proven highly successful in many areas, including military and security monitoring. In this paper, we propose a method to use the edge–betweenness community detection algorithm to determine ...
  • Location Disclosure in LTE Networks by using IMSI Catcher 

    Sørseth, Christian (Master thesis, 2017)
    Long-Term Evolution (LTE) is currently being deployed in vast areas of the world and is the latest implemented standard in mobile communication. The standard is considered to have significant improvements compared to its ...
  • Modelling the dependability in Network Function Virtualisation 

    Lin, Wenqi (Master thesis, 2017)
    Network Function Virtualization has been brought up to allow the TSPs to have more possibilities and flexibilities to provision services with better load optimizing, energy utilizing and dynamic scaling. Network functions ...
  • SDN in Heterogeneous Mobile Tactical Networks 

    Fagervoll, Håvard Magne (Master thesis, 2017)
    Military operations are increasingly dependent on networks and transferring of data. A heterogeneous mobile tactical network, is a complex network with dynamic characteristics used during military operations. In the field, ...
  • Performance Analysis of Cloud Radio Access Network 

    Chekol, Asrat Temare (Master thesis, 2017)
    The mobile traffic is exploding due to an increase in number and type of devices; and complexity of services. There is also rising of Capital Expenditure (CAPEX) and Operational Expenditure (OPEX) while the Average Revenue ...
  • SpaceMint - A Cryptocurrency Based on Proofs of Space 

    Hønsi, Trond (Master thesis, 2017)
    Crypto currency, spacemint
  • Automatic Analysis of Scam Emails 

    Fagerland, Vegard (Master thesis, 2017)
    Email and email security have been the main topics of this master thesis. The thesis considers how an organization works with email security and security culture, the email specifications, threat agents, vulnerabilities ...
  • Fog Computing in Healthcare – A Review and Discussion 

    Kraemer, Frank Alexander; Bråten, Anders Eivind; Tamkittikhun, Nattachart; Palma, David (Journal article; Peer reviewed, 2017)
    Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ...
  • Attacking Mobile Privacy By Catching MSISDN Location 

    Ottesen, Christoffer Evjen (Master thesis, 2017)
    Today, we find wireless technology almost everywhere. Easily, we can communicate with people on the other side of the world using our mobile phones. By June 2017, the global number of unique mobile subscribers is over 5 ...
  • A Modular Method for High- Level Service Specification and Component Design Derivation 

    Fatima, Urooj (Doctoral theses at NTNU;2017:259, Doctoral thesis, 2017)
    This thesis addresses the problem of specifying the behaviour of distributed reactive systems in such a way that the component behaviours can be derived automatically. This automation demands specifications to be complete ...
  • Energy Consumption of Wireless IoT Nodes 

    Hussain, Amen (Master thesis, 2017)
    The Internet of Things (IoT) is an emerging technology, encompassing a wide spectrum of applications related to industrial control, smart metering, home automation, agriculture, eHealth and so on. For these applications ...
  • Long-Term Confidential Data Storage by Distributed Secret Shares 

    Løland Elle, Merete (Master thesis, 2017)
    There are several mobile password managers on the marked, where the most popular of these uses the classical solution for storage which requires both encryption and backup policies. If quantum computers become a reality, ...

Vis flere