Intelligent Detection of Malicious Activity on Tor |
15. sep. 2024 |
|
Sikkerhetsanalyse av ADS-B |
12. sep. 2024 |
|
Assessing the Reliability of PenTestGPT: A Comparative Case Study Between LLMs in AI-Driven Infrastructure Testing |
9. sep. 2024 |
|
Assessing the Reliability of PenTestGPT: A Comparative Case Study Between LLMs in AI-Driven Web Application Testing |
9. sep. 2024 |
|
Evaluating the Security, Usability, and Complexity of AI-Assisted Frameworks for Generating Web Applications |
9. sep. 2024 |
|
AI-Assisted Spam Filtering |
9. sep. 2024 |
|
Automated Privacy Risk Assessment Using Large Language Models: A Comparative Study |
9. sep. 2024 |
|
Security Management Systems (ISMS) in Norwegian organizations |
8. aug. 2024 |
|
Threats and Vulnerabilities of LLMs |
8. aug. 2024 |
|
Mapping and analyzing the Norwegian cybersecurity incident reporting ecosystem |
31. mai 2024 |
|
A NIS2 pan-European registry for identifying and classifying essential and important entities |
31. mai 2024 |
|
Anomaly Detection using Advanced Data Analytics in 5G-IoT |
17. jan. 2024 |
|
Digital Twin-based Anomaly Detection for e-Health Infrastructures |
17. jan. 2024 |
|
5G Threat and Risk Modelling |
9. okt. 2023 |
|
Threat Indication Using Web Search Engine Trends |
20. aug. 2023 |
|
An Application for Graphically Representing Cybersecurity Operations Playbooks: the CACAO use case |
29. okt. 2022 |
|
Integrated Defense with OASIS Open Command and Control (OpenC2) |
17. okt. 2022 |
|
Open-Source Vulnerabilities in Software Supply Chains |
30. sep. 2022 |
|
Kvalitetsvurdering av setninger som passord |
30. sep. 2022 |
|
Using cryptography insecurely: Don’t do this at home! – But why? |
21. sep. 2022 |
|
Smart contract for an investment and trading platform |
19. sep. 2022 |
|
Deteksjon av sjelden angrepstrafikk med Fourier-analyse |
8. sep. 2022 |
|
Deteksjon av gammel/utdatert programvare |
7. sep. 2022 |
|
Applied Cyber Security |
7. sep. 2022 |
|
Post-quantum kryptografi: Lattice med struktur |
22. okt. 2021 |
|