• Searchable Privacy-Enabled Information and Event Management Solution. 

      Seneger, Kristoffer T. (Master thesis, 2015)
      With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ...
    • Secure and scalable dataprocessing and communications for an Animal Tracking System 

      Johansen, Ynge Farbu; Vinningland, Øystein (Master thesis, 2003)
      Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ...
    • Secure multi-party based cloud computing framework for statistical data analysis of encrypted data 

      Gardiyawasam Pussewalage, Harsha Sandaruwan; Ranaweera, P. Sashmal (Master thesis, 2013)
      Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ...
    • Securing Assets with RFID 

      Oustad, Mats; Chanrasekaram, Santhakumar (Master thesis, 2008)
      Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ...
    • Security and privacy for wireless ad-hoc networks 

      Pettersen, Audun; Åsen, Frode (Master thesis, 2006)
      The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...
    • Security in GPRS 

      Bjåen, Geir Stian; Kaasin, Erling (Master thesis, 2001)
      GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ...
    • Security in NFC with Wi‐Fi Protected Setup as a use 

      Magnussen, Rune; Oppheim, Sølve (Master thesis, 2008)
      Near Field Communication is a short‐range communication channel that is one of the most promising technologies around. One of the purposes for this technology is to simplify first‐time connections to other wireless ...
    • Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology 

      Storfjord, Monica (Master thesis, 2000)
      The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ...
    • Security issues in epassports : ICAO standard and national implementations as part of the US visa-waiver program 

      Bjelkåsen, Eili; Olsen, Linda Walbeck (Master thesis, 2006)
      After the 9/11 terror attacks against the US there have been concerns about how to positively identify every individual entering a country. As a direct result ePassports are now being issued in several countries all over ...
    • SECURITY ON THE MIS AND THE INTERFACING MODEM 

      Azadagli, Emmanuel Mensah (Master thesis, 2012)
      Konfidensiell til / confidential until 01.07.2017
    • Selvorganiserende læring av trafikkategorier i Bayesianskpakkebasert IDS 

      Wilhelmsen, Tor Oskar (Master thesis, 2005)
      Detektering av uønsket trafikk i et datanettverk utføres i dag av systemer med mer eller mindre grad av manuelt vedlikehold. Slikt vedlikehold består typisk av nedlasting av oppdateringer som bidrar til deteksjon av de ...
    • Semantic Description of IoT Security for Smart Grid 

      Ayele, Getinet (Master thesis, 2017)
      This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and ...
    • Semantic Web for Data integration within Oil & Gas or maritime 

      Kuang, Li (Master thesis, 2009)
      The Semantic Web technology has become quite popular recently. The ontology-based data integration architecture is the important part of Semantic Web technology. It enables the sharing of concept with common schemas and ...
    • Semi-automated web resource discovery and analysis : an approach based on interactive machine learning principles 

      Pedersen, Asle (Master thesis, 2001)
      This report presents a semi-automated approach to web Resource Discovery based on an architecture in which both human learning and machine learning is integrated in the same model. The fundamental idea of the semi-automated ...
    • Semi-automatic web resource discovery using ontology-focused crawling 

      Kristoffersen, Erik; Sætren, Marius André (Master thesis, 2005)
      The enormous amount of information available on the Internet makes it difficult to find resources with relevant information using regular breadth-first crawlers. Focused crawlers seek to exclusively find web pages that ...
    • Sensornettverk : batterisparende aktivering av sensorer 

      Vestbø, Roberth (Master thesis, 2007)
      Batteridrevne trådløse sensornettverk kan dra nytte av intelligente metoder for å spare strøm på batteriene. Denne oppgaven ser på tre forskjellige maskinlæringsalgoritmer for kontroll av strømforbruket, Hensikten med ...
    • Service virtualization : bringing a remote personal video recorder into a local network 

      Gomez, Jesus Ruiz de Mier (Master thesis, 2009)
      Within residential networks digital devices may share information between themselves through several discovery standards such as Bluetooth, Bonjour, or Universal Plug & Play. Similarly, all residential services are ...
    • SharePoint governance 

      Ali, Mudassar (Master thesis, 2013)
      SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of ...
    • Short-term forecasting of electricity consumption using Gaussian processes 

      Al-Hawani, Waseem; Pussewala Hewage, Milindanath Samarasinghe (Master thesis, 2012)
      Forecasting of electricity consumption is considered as one of the most signi cant aspect of e ective management of power systems. On a long term basis, it allows decision makers of a power supplying company to decide ...
    • Short-term forecasting of electricity consumption using Gaussian processes 

      Kejela, Girma (Master thesis, 2012)
      Although state-of-the-art models like linear regression and neural networks have been widely used for electricity consumption forecasting, the demand for improved prediction accuracy is still very high. A small improvement ...