Search results for "Matematikk"

showing 10 items of 707 documents

The genesis of data-driven decision-making in the world of soccer tactics : deciphering the potential of big data

2021

Master's thesis in Information systems (IS501) Arguably, soccer is a more fluid sport than other popular sports such as baseball, American football, and cricket, which explicitly require more discrete ‘plays.’ Moreover, with twenty-two players always committed, it has more moving elements than basketball or ice hockey. From a mathematical perspective, this signifies that soccer has more degrees of freedom than these other sports, making it difficult to evaluate the game using one or a small number of metrics. Over time, this challenge has been made exceedingly more difficult within the soccer community. The availability of data has increased much more rapidly than the scientific advancement…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Algoritmer og beregnbarhetsteori: 422ComputingMilieux_PERSONALCOMPUTINGIS501
researchProduct

Investigating Cloud Access Security Broker In A Healthcare Service : Creating A Cloud Access Security Broker (CASB) Discussion Frame-work For Evaluat…

2021

Master's thesis in Cyber security (IKT523) Covid-19 accentuated the importance of accessible services, causing a major increase in the adoption of cloud services for enterprises. Cloud computing is a new paradigm that promises significant benefits for organizations in healthcare services. However, cloud computing also transforms enterprise architectures and introduces new problems of information security. Decision-makers in a large healthcare service provider need to justify decisions on cloud adoption, but such a task is convoluted given the different views on cloud computing and the potential impact of cyberthreats on critical infrastructures. As a consequence, cloud security controls nee…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Blockchain for Attribute-Based Access Control : A flexible access control scheme with Permission Delegations

2021

Master's thesis in Cyber security (IKT523) Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primitive versions of AC use an Access Control List (ACL) to represent access, a more versatile variant called Attribute-Based Access Control (ABAC) has quickly become a popular approach to implementing AC due to its flexibility and scalability and enabling cross-domain access. This thesis proposes a Blockchain-based ABAC scheme with delegatable permission tokens through the use of Hyperledger Fabric and Java Web Tokens (JWT). Fabric is used to store various attribute and revocation transactions necessary in an ABAC system, while JWT’s purpose is to delegate…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Detecting Packed PE Files : Executable file analysis for the Windows operating system

2021

Master's thesis in Cyber security (IKT523) Malware authors invent new methods regularly to hide and obfuscate their code. One of these methods is known as packing. An entire program is hidden inside another executable program; however, the hidden program is usually encrypted or obfuscated such that antivirus software cannot detect its real intent without unpacking it. This thesis will look into common PE packers and describe the development of an application used to detect packed PE binaries using static analysis. This thesis is useful for reverse engineers and antivirus developers; it will give some insight into the world of packing binaries, compression methods, and encryption methods. Th…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Tuning Suricata Intrusion Detection System for High Performance on a Single Non-Uniform Memory Access Node

2021

Master's thesis in Cyber security (IKT523) The rapid increase in network capacity poses a challenge in detecting cyber attacks. Suricata is a modern intrusion detection system(IDS) used to monitor network traffic to detect cyberattacks. Telenor is monitoring considerable amounts of network traffic with IDS-servers, commonly referred to as sensors. Occasionally, the traffic load reaches a point where theIDS drops some of the incoming packets, termed packet loss. This is a serious problem, asit can lead to undetected threats. With this in mind, Telenor wants to find out if a lossless detection can be achieved by tuning Suricata for high performance. This can be accomplished by pinning dedicat…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IKT523
researchProduct

Informasjonssikkerhetsstyring i norsk kommunesektor : En case studie

2021

Master's thesis in Information systems (IS501) Norske kommuner digitaliserer sine tjenester i stadig økende grad, samtidig som trusselbildet fra aktører med ondsinnede intensjoner øker. For å imøtekommedisse truslene og ivareta innbyggernes integritet finnes det ulike styringssystemer for informasjonssikkerhet som enten er anbefalte eller obligatoriske i norsk offentlig sektor. Digitaliseringsdirektoratet peker på at små og mellomstore kommuner har store utfordringer med å praktisere informasjonssikkerhetsstyring. Gjennom en kvalitativ metode, med16 semistrukturerte intervjuer i små og mellomstore kommuner i Norge, har vi forsøkt å finne årsaker til, og mulige løsninger på utfordringene kom…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IS501VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242
researchProduct

Teachers’ awareness, knowledge and practice of information security in school

2020

Master's thesis in Information systems (IS501) We found that the teachers in our respondent schools lacked formal training on topics of information security. Most of them did not know what phishing, backdoors and keyloggers are, and many reused passwords across multiple sites. The teachers were also concerned about lacking the knowledge to properly teach their students about information security and netiquette. The principals did not consider information security to be a primary concernand the IT-department employees had varying knowledge of information security.Meanwhile the municipality has been focused on procuring hardware and softwarefor the teachers and students, and ensuring proper u…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424IS501VDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240::Offentlig og privat administrasjon: 242
researchProduct

Privacy-enhanced network monitoring

2013

Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, 2014 This PhD dissertation investigates two necessary means that are required for building privacy-enhanced network monitoring systems: a policy-based privacy or confidentiality enforcement technology; and metrics measuring leakage of private or confidential information to verify and improve these policies. The privacy enforcement mechanism is based on fine-grained access control and reversible anonymisation of XML data to limit or control access to sensitive information from the monitoring systems. The metrics can be used to support a continuous improvement process, by quantifying leakages of private o…

VDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424VDP::Technology: 500::Information and communication technology: 550VDP::Social science: 200::Economics: 210::Business: 213
researchProduct

On Steady Solutions of a generalized Whitham equation

2021

Paid open access

VDP::Matematikk og Naturvitenskap: 400::Matematikk: 410
researchProduct

Analysis of relations between attitude towards mathematics, prior knowledge, self-efficacy, expected and actual grades in mathematics

2022

The purpose of this study is to analyse relations between students’ attitude towards mathematics, prior knowledge, self-efficacy, expected grades, and performance in mathematics among 115 firstyear engineering students. We combine two statistical techniques to analyse the data we generated by questionnaires and two tests. First, item-level modeling, in terms of confirmatory factor analysis, which we use to compute the factor scores of construct-validated measures, and to control for measurement errors. Second, composite modeling, in terms of path analysis, which we use to test the research hypotheses. The findings show that both self-efficacy and expected grades have substantial effects on …

VDP::Matematikk og Naturvitenskap: 400::Matematikk: 410
researchProduct