| Drone LIDAR streaming for Public Safety |
28. aug. 2025 |
|
| Proactive Defense Against Stealthy Poisoning via Embedding Anomaly Detection |
27. aug. 2025 |
|
| Beyond Template-Based Poisoning: Semantic and Adaptive Attacks on RAG |
27. aug. 2025 |
|
| Towards a Holistic Threat Model for General Purpose AI Systems |
27. aug. 2025 |
|
| Implementing a Passkey Revocation Service |
20. aug. 2025 |
|
| Evaluating Authentication Inconsistencies for Specific Authentication Methods |
20. aug. 2025 |
|
| Informasjonssikkerhet i omorganiseringsprosesser |
20. juni 2025 |
|
| A Nationwide Vulnerability Assessment and Reporting Platform |
28. nov. 2024 |
|
| Ledelse av informasjonssikkerhet i 澳门皇冠体育,皇冠足球比分 med Gritera Security |
22. nov. 2024 |
|
| Cybersecurity in collaboration with mnemonic |
4. nov. 2024 |
|
| Application of Bayesian Inversion for API Auditing |
22. sep. 2024 |
|
| Store spr?kmodeller for deteksjon, analyse og respons av digitale trusler |
22. sep. 2024 |
|
| Reversering av obfuskert skadevare |
20. sep. 2024 |
|
| Maskinl?ring for CTF |
20. sep. 2024 |
|
| Maskinl?ring for dekompilering |
20. sep. 2024 |
|
| Prosess for verdikartlegging og -vurdering i risikostyring |
19. sep. 2024 |
|
| Hvordan forhindre at informasjonssikkerhet og personvern blir et hinder for pasientsikkerhet? |
18. sep. 2024 |
|
| Valg av risikostyringsrammeverk |
18. sep. 2024 |
|
| Intelligent Detection of Malicious Activity on Tor |
15. sep. 2024 |
|
| Security Management Systems (ISMS) in Norwegian organizations |
8. aug. 2024 |
|
| Threats and Vulnerabilities of LLMs |
8. aug. 2024 |
|
| Mapping and analyzing the Norwegian cybersecurity incident reporting ecosystem |
31. mai 2024 |
|
| A NIS2 pan-European registry for identifying and classifying essential and important entities |
31. mai 2024 |
|
| Anomaly Detection using Advanced Data Analytics in 5G-IoT |
17. jan. 2024 |
|
| Digital Twin-based Anomaly Detection for e-Health Infrastructures |
17. jan. 2024 |
|