Search results

Jump to: navigation, search

Page title matches

Page text matches

  • |Title=pilot Security Architecture for embedded systems ...n” rather than as “add-on” functionalities, proposing and perceiving the first step toward SPD certification for future Embedded Systems.
    941 B (118 words) - 08:26, 11 February 2016
  • |Title=Development of the Research Group ConnectedLife at UNIK ...ologies for Sensor Descriptions. We expect that the next generation of the Internet will create automatic processes, where sensor data contribute to business d
    1,003 B (126 words) - 07:29, 9 April 2014
  • {{#switchtablink:Math|Click here to go to the next tab...}} see more in [[Ask]]...
    10 KB (1,438 words) - 17:25, 8 March 2021
  • |Title=Sensor Security for the Internet of People, Things and Services |Research_Domain=EHealth, Internet - IoPTS,
    4 KB (529 words) - 08:25, 11 February 2016
  • * how social media change our way of buying and selling * IT: describe the user, her wishes and conect them to social profiles ("user oriented social
    4 KB (500 words) - 09:54, 7 September 2011
  • |NewsDE=Der Kurs wurde in den Jahren 2008 bis 2014 gegeben, die sicherheitsrelevanten und kontekstsen |News=The course was given from 2008 to 2014. Security relevant aspects are transferred into course [[UNIK4750]]
    6 KB (900 words) - 08:31, 13 February 2019
  • |Titel=Sensor-based decisions in eHealth ...delling, or simply a support system for users in context-aware situations. The selected scenario is based on eHealth, with a home-supporting system.
    8 KB (1,203 words) - 11:13, 9 April 2014
  • ...ces in information and communication to the well-being of people. Some of the dominant trends are ...s ''[[cognitive computing]]''. In this field information is gathered about the person, living style, surrounding, genetics to find either
    5 KB (764 words) - 21:44, 25 October 2017
  • |Title=Semantics in mobile networks ...rivacy and security for the user, and the integration with the Internet of Things (IoT)
    7 KB (994 words) - 03:06, 25 April 2013
  • |Titel=Network of Things for Medical Care |Keywords=EHealth, IoT, Internet of Things, routing, Network,
    3 KB (476 words) - 23:28, 23 April 2012
  • |Title=Information Security in industrial Sensor and Mobile Systems ...principles of sensor networks, and has special focus on security measures of sensor networks
    5 KB (666 words) - 16:47, 15 February 2019
  • |Titel=Measurable Security for Sensor Communication in the Internet of Things |Objective=Internet of Things (IoT) will mean for industrial systems
    7 KB (1,020 words) - 13:59, 1 December 2023
  • ...ected areas of Research in the area of [[Wireless Networks and Information Security]]. The Research addresses
    2 KB (302 words) - 14:14, 23 August 2017
  • |Title=Selected topics in Information Security in Industrial Sensor- and Mobile Systems |Abstract=This course targets specific scenarios for security measures of sensor networks
    5 KB (641 words) - 09:00, 13 February 2019
  • |Title=From Internet of Things to Internet of Everything |Project=Internet-of-Things.no
    4 KB (548 words) - 23:44, 18 February 2014
  • |Title=Value network: Internet of Things ...sers) in Norway to work jointly towards a common vision of the Internet of Things.
    1 KB (187 words) - 21:29, 21 September 2014
  • ...A''), while various developments in Wireless Networks are summarised under the 802.11 and 802.16 developments. * Sensor systems and the Internet of Things
    1 KB (174 words) - 22:17, 24 February 2014
  • |ResearchDomain=Internet - IoPTS ...rovide a variety of services based on inputs from people, sensors or other Internet platforms.
    545 B (76 words) - 12:34, 9 April 2014
  • |Title=SICS Security Seminar 2014 |Depiction=Program-SICS security seminar-2014.pdf,
    2 KB (238 words) - 19:12, 9 April 2014
  • ...20things%20security K. Zhao and L. Ge, "A Survey on the Internet of Things Security"] ...Search_All Roman, R., Najera, P., and Lopez, J., "Securing the Internet of Things"]
    4 KB (540 words) - 07:43, 8 April 2016
  • :::from Remmen at 14:50 for the 15:10 train :::from Remmen at 15:50 for the 16:05 train
    5 KB (694 words) - 08:51, 11 October 2016
  • = List of papers for UNIK 4750 = ...be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics
    7 KB (1,034 words) - 21:40, 23 February 2016
  • |Titel=The human aspect in Smart grids (from Security and Privacy point of view) ...mans can influence the security of the smart grid, and how humans perceive the privacy aspects.
    4 KB (672 words) - 12:40, 3 October 2016
  • ...a prototypical solution, and evaluates aspects like security and transfer-of-ownership . |Methods=The tools and methods in this thesis are based on
    7 KB (995 words) - 07:42, 4 July 2023
  • * Android: app & phone are working in the same way * cyber-physical systems and the Internet of Things
    2 KB (189 words) - 13:23, 13 January 2015
  • |Project=Basic Internet, GravidPluss, ...for |?AI_Status= | sort=Due date | limit=10 | format=ul | intro= '''List of open Action Items for Iñaki and Josef'''}}
    4 KB (652 words) - 14:12, 21 October 2015
  • ...aged Security Centre for Smart Grids, co-located with the Norwegian Centre of Expertise (NCE Smart). The founding partners of the initiative were:
    27 KB (3,835 words) - 09:32, 16 October 2018
  • .../wp-content/uploads/2019/09/Toktam-CyberSecEnergy-2019-1.pdf Cybersecurity in Energy Informatics], INDUSTRY-SCIENCE MEETUP AT UIO, Dec 5th, 2019. ...bie, "Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems", The IEEE 13th International Symposium on Medical Information and Communication
    26 KB (3,343 words) - 12:59, 9 December 2020
  • ...aged Security Centre for Smart Grids, co-located with the Norwegian Centre of Expertise (NCE Smart). The founding partners of the initiative
    2 KB (317 words) - 18:57, 19 September 2016
  • |Title=Measurable Security for the Internet of Things ...ow you to compare security-related application goals with the results from the system analysis.
    12 KB (1,745 words) - 12:14, 23 April 2024
  • = Lectures in TEK5530 in earlier years = * 27Jan L2 Internet of Things
    31 KB (4,382 words) - 21:51, 25 January 2023
  • |Objective=Enhancement of project pages, with focus on BasicInternet.org and IoTSec.no |Research_Domain=Internet - IoPTS,
    3 KB (407 words) - 08:22, 11 February 2016
  • = Non-scientific presentation of IoTSec = ...have happened, and have alerted academia and industry to put the focus on security.
    4 KB (626 words) - 10:07, 4 February 2016
  • ...structure. The Research Project received funding from the Research Council of Norway (RCN) to contribute to a safe information society.
    422 B (59 words) - 14:21, 20 November 2015
  • |Title=Security in IoT for Smart Grids ...sh Rajasekharan, Håkon Duus, David Aleksandersen, Ole Gabrielsen, Dang Ha The Hien, Stein Gjessing, Sigurd Eskeland, Åsmund Skomedal, Ming-Chang (Leo) L
    3 KB (402 words) - 12:42, 27 February 2019
  • ...hD positions in the area of <br/> "Security Modelling for the Internet of Things (IoT)" [[File:FutureSmartGrid.png|450px|right|Examples of future Smart Grid]]
    9 KB (1,348 words) - 10:53, 2 February 2017
  • ...elcome to the Student Corner for ''Security and Privacy in the Internet of Things (IoT)''. <br/> Feel free to have a look at [[UNIK4750]] course related to the project.
    2 KB (240 words) - 13:14, 20 July 2018
  • |Title=Measurable Security for the Internet of Things ...ow you to compare security-related application goals with the results from the system analysis.
    5 KB (683 words) - 18:09, 20 April 2020
  • == Recommendations on the overall Research Portfolje == ...their products, apps, services. These can be seen for privacy the same as the energy labels for electronic equipment. - see: [[IoTSec:Privacy_Label]]
    6 KB (918 words) - 14:04, 23 November 2016
  • = The Denial of Service Attack from IoT devices= ...CCTV) cameras, video-recorders, and set­top boxes. The question addressed in this blog is which consequences we can draw from these attacks, and what we
    7 KB (1,122 words) - 10:50, 16 December 2016
  • |Title=Secure COnnected Trustable Things (ECSEL-IA 737422) ..., i.e. things interconnected by dependable wireless technology and valuing the end-users' privacy rules.
    15 KB (2,123 words) - 02:14, 1 October 2020
  • ...; background: #093759" >Secure Connected Trustable Things (SCOTT) finished in Sep2020</span><br/><br/> = Objective of SCOTT=
    14 KB (2,003 words) - 11:19, 2 January 2021
  • = List of papers for UNIK 4750 = ...be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics
    9 KB (1,223 words) - 20:00, 8 March 2017
  • Several positions on security and formal modelling/programming for IoT and/or CPS. [[File:FutureSmartGrid.png|450px|right|Examples of future Smart Grid]]
    7 KB (1,095 words) - 09:22, 17 March 2017
  • = Objective of SCOTT= ..., i.e. things interconnected by dependable wireless technology and valuing the end-users' privacy rules.
    5 KB (640 words) - 15:30, 26 May 2017
  • ...ity with available networked systems. Current solutions on the Internet of Things consumer market are mostly proprietary and vendors are thus trying to push ...otocols and interfaces for cloud integration and personal data protection. In particular, sensors and actuators connected to each other via different acc
    4 KB (566 words) - 07:53, 11 July 2017
  • [[File:SHIELD_Book.png|213px|right|The SHIELD Methodology by CRC Press]] ''The SHIELD book is published'': <br/>
    9 KB (1,186 words) - 22:38, 30 September 2020
  • ...f critical infrastructure. The other issue is extending the access control in physically separated locations with virtually defined areas with locally de ...d processes with respect to safety and security. Thus, the main objectives of this Use Case are:
    5 KB (687 words) - 15:13, 20 July 2018
  • ...ic infrastructure (barriers, access points) and do not ensure proper level of situation awareness. ...solution to extend safety and security level in industrial facility areas. The main objectives related to this work package are:
    6 KB (879 words) - 20:32, 19 July 2018
  • = Publications in DiversIoT = == Peer-reviewed articles in well established venues ==
    5 KB (701 words) - 11:50, 30 November 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)