Now showing items 576-595 of 1129

    • Machine Learning Aided Static Malware Analysis: A Survey and Tutorial 

      Shalaginov, Andrii; Banin, Sergii; Dehghantanha, Ali; Franke, Katrin (Chapter, 2018)
      Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections. The fast growth ...
    • Malware Analysis;: A Systematic Approach 

      Wedum, Petter Langeland (Master thesis, 2008)
      An almost incomprehensible amount of data and information is stored on millions and millions of computers worldwide. The computers, interconnected in local, national and international networks, use and share a high number ...
    • Malware Analysis; Frameworks and Tools for Automated Dynamic Analysis of Malware 

      Eriksson, Thomas (Master thesis, 2009)
      This thesis describes different automated dynamic malware analysis solutions and their underlying technologies. A good deal of prerequisite concepts has to be covered before the actual solutions are studied. Some of these ...
    • Malware Detection Through Call Graphs 

      Kinable, Joris (Master thesis, 2010)
      Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of the malicious samples among these executables are variations of earlier encountered malware, created by their authors to ...
    • Malware detection through opcode sequence analysis using machine learning 

      Bragen, Simen Rune (Master thesis, 2015)
      To identify malware, most antivirus scanners use a combination of signature matching and heuristic-based detection. Signature matching compares only to previously known files, while heuristic-based detection looks for known ...
    • Managed access dependability for critical services in wireless inter domain environment 

      Følstad, Eirik Larsen (Doctoral thesis at NTNU;2016:66, Doctoral thesis, 2016)
      The Information and Communications Technology (ICT) industry has through the last decades changed and still continues to affect the way people interact with each other and how they access and share information, services ...
    • Managed Dependability in Interacting Systems 

      Helvik, Bjarne Emil; Nencioni, Gianfranco; Heegaard, Poul Einar; Wäfler, Jonas (Springer Series in Reliability Engineering;, Chapter; Peer reviewed, 2016)
      AdigitalICTinfrastructuremustbeconsideredasasystemofsystemsin itself, but also in interaction with other critical infrastructures such as water distributions, transportation (e.g. Intelligent Transport Systems) and Smart ...
    • Management of Large Scale NetFlow Data by Distributed Systems 

      Tian, Zehua (Master thesis, 2016)
      Nowadays, as network has almost permeated all aspects of people s life, network quality and security administration becomes very necessary. A very important part is monitoring and analyzing network traffic. NetFlow is an ...
    • Managing Security Trade-offs in the Internet of Things using Adaptive Security 

      Aman, Waqas; Snekkenes, Einar (Chapter, 2015)
      Adaptive security can take dynamic trade-off decisions autonomously at runtime and is considered a key desirable attribute in the Internet of Things (IoT). However, there is no clear evidence that it can handle these ...
    • Managing signatures for IDS in a distributed environment: a study of a signature management system 

      Henriksen, David Ormbakken (Master thesis, 2012)
      ENGELSK: There has been a 36 percent increase in detected computer attacks from 2010 to 2011 according to the latest Symantec threat report. An increase in the total number of attacks from the previous year to the next ...
    • Managing the development of secure electronic banking 

      Nilsen, Tom (Master thesis, 2006)
      NORSK: Dette MSc prosjektet er en oppgave fra en bank. Sikkerhet har alltid vært viktig for banker. Med Nettbank har det blitt ennå viktigere etter som Internet kan overstige filial og kontornettets viktighet som ...
    • Manipulation and Deception with Social Bots: Strategies and Indicators for Minimizing Impact 

      Haugen, Geir Marius Sætenes (Master thesis, 2017)
      This thesis have enlightened the topic of social bots and how to indicate their presence. As a practical part of the work in this thesis, a program for indicating social bots on Twitter were developed. The presented solution ...
    • Manufactured by software: SDN-enabled multi-operator composite services with the 5G Exchange 

      Biczok, Gergely; Dramitinos, Manos; Toka, Lazio; Heegaard, Poul Einar; Lønsethagen, Håkon (Journal article; Peer reviewed, 2017)
      Foreseen 5G verticals hold the promise of being true value-added services, hence bringing significant income to their respective providers. However, the nature of these verticals are very demanding in terms of both economic ...
    • Market for the Sales of Wireless Broadband in Trondheim 

      Ahmed, Awais Ejaz (Master thesis, 2010)
      Wireless Trondheim is today mainly a service for nomadic and mobile broadband in other words, for use outside the home. The major goal of this study was to examine the market potential and the ability to use wireless ...
    • Measurement Analysis and Improvement of rerouting in UNINETT 

      Skaland, Håkon (Master thesis, 2007)
      This thesis focuses on the analysis of the rerouting times in UNINETT, the Norwegian research network. Rerouting happens in case of a topology change of the network, and the routers have to calculate new paths to all ...
    • Measurement-Based Network Anomaly Diagnosis 

      Abdelkefi, Atef (Doctoral thesis at NTNU;2015:121, Doctoral thesis, 2015)
      With the rapid and tremendous growth of Internet-centric services, diagnosing network anomalies that disrupt service quality has become increasingly important. A plethora of techniques have been proposed to address the ...
    • Measurement of Information Security - a cost benefit analysis of measurements at Norsk Pasientregister (NPR) 

      Hartveit, Sjur (Master thesis, 2011)
      ENGELSK: Measurement of information security seeks to improve the efficiency of the information security in an organization. Measurements can give advantages like: Enabling organizations to judge if the state of ...
    • Measuring and Optimizing Energy Efficiency in Internet Communication: Implementing a Packet-Level Energy Model for Content Delivery Networks 

      Sachdeva, Gitanjali (Master thesis, 2013)
      Green ICT (Information and Communication Technology) aims at reducing the environmental impacts of ICT operations, maximizing energy efficiency and promoting recyclability. The ICT industry is resource intensive with rapidly ...
    • Measuring Information Security Awareness. A survey showing the Norwegian way to do it. 

      Mathisen, Johnny (Master thesis, 2004)
      NORSK: Holdningene og bevisstheten blant de ansatte har stor betydning for informasjonssikkerheten i dagens bedrifter. Det er en vanlig oppfatning at menneskene og deres oppførsel faktisk betyr mer for informasjonssikkerheten ...
    • Measuring perceptual contrast in a multilevel framework 

      Simone, Gabriele; Pedersen, Marius; Hardeberg, Jon Yngve; Rizzi, Alessandro (Proceedings of SPIE;7240, Journal article; Peer reviewed, 2009)
      In this paper, we propose and discuss some approaches for measuring perceptual contrast in digital images. We start from previous algorithms by implementing different local measures of contrast and a parameterized way to ...