• Sammenkobling av lyd og visuelle effekter ved hjelp av datateknologi 

      Meier, Thomas (Master thesis, 2006)
      Sammenkobling av lyd og visuelle effekter kan man i dag se på diverse multimedieapplikasjoner. De applikasjonene som brukes i dag, bruker som regel metoder og algoritmer der man ser på frekvensene til et musikkstykke. ...
    • SCADA Intrusion Detection System Test Framework 

      Waagsnes, Henrik (Master thesis, 2017)
      Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This ...
    • Scenarios for Crisis in European Critical Energy Infrastructure 

      Li, Jing; Li, Pei (Master thesis, 2009)
      A sudden crisis occurrence, such as a big electricity cut, might not be regarded as an isolated incident: In almost all cases, a power outage crisis might bring about multiple losses with e.g. legal, social and economic ...
    • Seamless Hand-over Algorithm for Wireless Enterprise Networks 

      Hodnebrog, Gjermund; Jin, Qi (Master thesis, 2007)
      The mass deployment of the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 based wireless local area networks (WLAN) and increased sales in hand-held devices supporting WLAN have resulted in an urgent ...
    • Searchable Privacy-Enabled Information and Event Management Solution. 

      Seneger, Kristoffer T. (Master thesis, 2015)
      With network traffic proliferating over the last couple of decades, there is an increasing need to monitor security information in order to prevent and resolve network security threats. A Security Information and Event ...
    • Secure and scalable dataprocessing and communications for an Animal Tracking System 

      Johansen, Ynge Farbu; Vinningland, Øystein (Master thesis, 2003)
      Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations ...
    • Secure multi-party based cloud computing framework for statistical data analysis of encrypted data 

      Gardiyawasam Pussewalage, Harsha Sandaruwan; Ranaweera, P. Sashmal (Master thesis, 2013)
      Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among ...
    • Securing Assets with RFID 

      Oustad, Mats; Chanrasekaram, Santhakumar (Master thesis, 2008)
      Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology ...
    • Security and privacy for wireless ad-hoc networks 

      Pettersen, Audun; Åsen, Frode (Master thesis, 2006)
      The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...
    • Security in GPRS 

      Bjåen, Geir Stian; Kaasin, Erling (Master thesis, 2001)
      GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ...
    • Security in NFC with Wi‐Fi Protected Setup as a use 

      Magnussen, Rune; Oppheim, Sølve (Master thesis, 2008)
      Near Field Communication is a short‐range communication channel that is one of the most promising technologies around. One of the purposes for this technology is to simplify first‐time connections to other wireless ...
    • Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology 

      Storfjord, Monica (Master thesis, 2000)
      The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ...
    • Security issues in epassports : ICAO standard and national implementations as part of the US visa-waiver program 

      Bjelkåsen, Eili; Olsen, Linda Walbeck (Master thesis, 2006)
      After the 9/11 terror attacks against the US there have been concerns about how to positively identify every individual entering a country. As a direct result ePassports are now being issued in several countries all over ...
    • SECURITY ON THE MIS AND THE INTERFACING MODEM 

      Azadagli, Emmanuel Mensah (Master thesis, 2012)
      Konfidensiell til / confidential until 01.07.2017
    • Selvorganiserende læring av trafikkategorier i Bayesianskpakkebasert IDS 

      Wilhelmsen, Tor Oskar (Master thesis, 2005)
      Detektering av uønsket trafikk i et datanettverk utføres i dag av systemer med mer eller mindre grad av manuelt vedlikehold. Slikt vedlikehold består typisk av nedlasting av oppdateringer som bidrar til deteksjon av de ...
    • Semantic Description of IoT Security for Smart Grid 

      Ayele, Getinet (Master thesis, 2017)
      This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and ...
    • Semantic Web for Data integration within Oil & Gas or maritime 

      Kuang, Li (Master thesis, 2009)
      The Semantic Web technology has become quite popular recently. The ontology-based data integration architecture is the important part of Semantic Web technology. It enables the sharing of concept with common schemas and ...
    • Semi-automated web resource discovery and analysis : an approach based on interactive machine learning principles 

      Pedersen, Asle (Master thesis, 2001)
      This report presents a semi-automated approach to web Resource Discovery based on an architecture in which both human learning and machine learning is integrated in the same model. The fundamental idea of the semi-automated ...
    • Semi-automatic web resource discovery using ontology-focused crawling 

      Kristoffersen, Erik; Sætren, Marius André (Master thesis, 2005)
      The enormous amount of information available on the Internet makes it difficult to find resources with relevant information using regular breadth-first crawlers. Focused crawlers seek to exclusively find web pages that ...
    • Sensornettverk : batterisparende aktivering av sensorer 

      Vestbø, Roberth (Master thesis, 2007)
      Batteridrevne trådløse sensornettverk kan dra nytte av intelligente metoder for å spare strøm på batteriene. Denne oppgaven ser på tre forskjellige maskinlæringsalgoritmer for kontroll av strømforbruket, Hensikten med ...