Blar i SINTEF Digital på dokumenttype "Chapter"
Viser treff 41-60 av 429
-
All in a day's work: Password cracking for the rest of us
(Chapter, 2009)The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as ... -
An architectural foundation for security model sharing and reuse
(Chapter, 2009) -
An Assessment of Avionics Software Development Practice: Justifications for an Agile Development Process
(Lecture Notes in Business Information Processing;283, Chapter, 2017)Avionic systems for communication, navigation, and flight control, and many other functions are complex and crucial components of any modern aircraft. Present day avionic systems are increasingly based on computers and a ... -
An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations
(Lecture Notes in Computer Science;12026, Chapter; Peer reviewed, 2020)We have in an earlier study proposed a set of requirements and an approach to identification and modelling of cybersecurity risks and their impacts on safety, within the context of smart power grids. The approach, which ... -
An investigation of the relationship between texture and tyre/road noise for different types of road surfaces and passenger car tyres
(Chapter, 2014)The texture of the road surface has a major influence on the generation of tyre/road noise. For dense surfaces this may be the most important factor besides the tyre characteristics themselves. Throughout several projects, ... -
Are Daily Stand-up Meetings Valuable? A Survey of Developers in Software Teams
(Chapter, 2017)The daily stand-up meeting is a widely used practice. However, what is more uncertain is how valuable the practice is to team members. We invited professional developers of a programming forum to a survey and obtained 221 ... -
Are Safe and Resilient Systems less Effective and Productive?
(Chapter, 2020)During the last 50 years, people have become considerably more physical and virtually connected due to a more modern and mobile world, and new technologies for collaboration and communication, such as mobile phones, ... -
Artificial Intelligence Advancements for Digitising Industry
(Chapter, 2022)In the digital transformation era, when flexibility and know-how in manufacturing complex products become a critical competitive advantage, artificial intelligence (AI) is one of the technologies driving the digital ... -
Artificial Intelligence for Well Integrity Monitoring Based on EM Data
(SINTEF Proceedings;7, Chapter; Peer reviewed; Conference object, 2021)Monitoring of integrity of plugged and abandoned (P&A'ed) wells is of interest for the oil and gas industry and for CO2 storage. The purpose of this study is to develop artificial intelligence (AI)-based approaches to ... -
As strong as the weakest link: Handling compromised components in OpenStack
(Chapter, 2011)This paper presents an approach to handle compromised components in an Infrastructure-as-a-Service Cloud Computing platform. Our experiments show that traditional incident handling procedures are applicable for cloud ... -
Audio augmented reality in public transport for exploring tourist sites
(Chapter, 2018)Audio augmented reality (AR) has a long research tradition in the tourism industry. Audio AR tour guides for urban environments provide location-based, auditory information about nearby sights, minimising distractions from ... -
AutoConf: Automated Configuration of Unsupervised Learning Systems using Metamorphic Testing and Bayesian Optimization
(Chapter, 2023)Unsupervised learning systems using clustering have gained significant attention for numerous applications due to their unique ability to discover patterns and structures in large unlabeled datasets. However, their ... -
Automating Security in a Continuous Integration Pipeline
(Chapter, 2022)Traditional approaches to software security are based on manual methods, which tend to stall development, leading to inefficiency. To speed up a software development lifecycle, security needs to be integrated and automated ... -
Automation in Human-Machine Networks: How Increasing Machine Agency Affects Human Agency
(Chapter, 2017)Efficient human-machine networks require productive interaction between human and machine actors. In this study, we address how a strengthening of machine agency, for example through increasing Levels of automation, affect ... -
Autonomous agile teams: challenges and future directions for research
(Chapter; Peer reviewed, 2018)According to the principles articulated in the agile manifesto, motivated and empowered software developers---relying on technical excellence and simple designs---create business value by delivering working software to ... -
AUV Pipeline Following using Reinforcement Learning
(Chapter, 2010) -
Barrier Management Digitalization in the Oil and Gas Industry - Status and Challenges
(Chapter, 2020)The background for the study described in this paper is the Norwegian Petroleum Safety Authorities (PSA) emphasis on major accidents and barrier management, where maintenance and maintenance management play important parts. ... -
Barriers Hindering an Efficient Implementation Process of Digital Technologies; a Case Study at Norwegian Manufacturing Companies
(Chapter; Peer reviewed, 2021)The existing wave of improvement in manufacturing industry is strongly driven by the application of digital technologies. Unfortunately, the implementation process is not straightforward. To understand the barriers which ... -
BatCave: Adding Security to the BATMAN Protocol
(Chapter, 2011)The Better Approach To Mobile Ad-hoc Networking (BATMAN) protocol is intended as a replacement for protocols such as OLSR, but just like most such efforts, BATMAN has no built-in security features. In this paper we describe ...