Find my device - Investigating mobile device tracking |
18. sep. 2024 |
|
OWASP machine learning vulnerabilities |
18. sep. 2024 |
|
Cybersecurity in Complex IT Environments |
16. sep. 2024 |
|
Intelligent Detection of Malicious Activity on Tor |
15. sep. 2024 |
|
Sikkerhetsanalyse av ADS-B |
12. sep. 2024 |
|
Assessing the Reliability of PenTestGPT: A Comparative Case Study Between LLMs in AI-Driven Infrastructure Testing |
9. sep. 2024 |
|
Assessing the Reliability of PenTestGPT: A Comparative Case Study Between LLMs in AI-Driven Web Application Testing |
9. sep. 2024 |
|
Evaluating the Security, Usability, and Complexity of AI-Assisted Frameworks for Generating Web Applications |
9. sep. 2024 |
|
AI-Assisted Spam Filtering |
9. sep. 2024 |
|
Automated Privacy Risk Assessment Using Large Language Models: A Comparative Study |
9. sep. 2024 |
|
Security Management Systems (ISMS) in Norwegian organizations |
8. aug. 2024 |
|
Threats and Vulnerabilities of LLMs |
8. aug. 2024 |
|
Tilgangskontroll med Relationship-Based Access Control |
10. juni 2024 |
|
Mapping and analyzing the Norwegian cybersecurity incident reporting ecosystem |
31. mai 2024 |
|
A NIS2 pan-European registry for identifying and classifying essential and important entities |
31. mai 2024 |
|
Anomaly Detection using Advanced Data Analytics in 5G-IoT |
17. jan. 2024 |
|
Digital Twin-based Anomaly Detection for e-Health Infrastructures |
17. jan. 2024 |
|
A Survey of Windows' Data Protection API (DPAPI) |
9. okt. 2023 |
|
5G Threat and Risk Modelling |
9. okt. 2023 |
|
Investigating anti-forensic techniques and their detection |
9. okt. 2023 |
|
Forensic Analysis of Secure Messaging Applications on Android Devices |
9. okt. 2023 |
|
Automated Reverse Engineering of Malware Binaries |
9. okt. 2023 |
|
Automated malware classification systems using machine learning |
9. okt. 2023 |
|
Behavior analysis of emerging malware strains |
9. okt. 2023 |
|
Memory Forensics: Techniques and tools for analysing volatile memory |
9. okt. 2023 |
|