Browsing NR vitenarkiv by Title
Now showing items 42-61 of 288
-
Comparing CMIP6 Climate Model Simulations of Annual Global Mean Temperatures to a New Combined Data Product
(Peer reviewed; Journal article, 2023) -
Comparison of Contextual Importance and Utility with LIME and Shapley Values
(Journal article; Peer reviewed, 2021)Different explainable AI (XAI) methods are based on different notions of ‘ground truth’. In order to trust explanations of AI systems, the ground truth has to provide fidelity towards the actual behaviour of the AI system. ... -
Consolidated Proceedings of the first ECSCI Workshop on Critical Infrastructure Protection, Virtual Workshop, June 24–25, 2020
(Book, 2021)Modern critical infrastructures (“critical entities” in the terminology of the new EU-CER Directive) are becoming increasingly complex, turning into distributed, large-scale cyber-physical systems. Cyber-physical attacks ... -
Consolidated Proceedings of the Second ECSCI Workshop on Critical Infrastructure Protection and Resilience
(Book, 2023)Modern critical infrastructures (or “critical entities” as now defined in the new EU-CER Directive) are becoming increasingly complex, turning into distributed, large-scale cyber-physical systems. Cyberphysical attacks are ... -
Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database
(Chapter, 2023)Knowledge graphs have shown promise for several cybersecurity tasks, such as vulnerability assessment and threat analysis. In this work, we present a new method for constructing a vulnerability knowledge graph from information ... -
A Contextually Supported Abnormality Detector for Maritime Trajectories
(Journal article; Peer reviewed, 2023)The analysis of maritime traffic patterns for safety and security purposes is increasing in importance and, hence, Vessel Traffic Service operators need efficient and contextualized tools for the detection of abnormal ... -
Cost-benefit analysis of universal design
(Report at the Norwegian Computing Center, Research report, 2015) -
Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things
(Journal article; Peer reviewed, 2022) -
Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things
(Journal article; Peer reviewed, 2021)These days, healthcare applications on the Internet of Medical Things (IoMT) network have been growing to deal with different diseases via different sensors. These healthcare sensors are connecting to the various healthcare ... -
Creating a Robot-Supported Education Solution for Children with Autism Spectrum Disorder
(Chapter, 2022)We introduce the ROSA project that aims to provide robot supported education in the areas of communication, language, and emotion for children with autism spectrum disorder. The background for the project is reviewed and ... -
Creating Personas with Disabilities
(Chapter, 2012)Personas can help raise awareness among stakeholders about users’ needs. While personas are made-up people, they are based on facts gathered from user research. Personas can also be used to raise awareness of universal ... -
Creating vignettes for a Robot-Supported Education Solution for Children with Autism Spectrum Disorder
(Chapter, 2022)As part of the work in developing a robotic toolkit to help children with ASD develop their social and communication skills, we have adapted a method for creating vignettes that has been fruitful in other studies. We present ... -
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
(Journal article; Peer reviewed, 2024) -
CybAlliance WP2 Annual Mobility Report 2023
(Research report, 2023) -
CybAlliance WP2 Annual National and International Workshops Report 2023
(Research report, 2023) -
CybAlliance WP2 Annual Open Seminar Report 2023
(Research report, 2023) -
Dark Pattern: A Serious Game for Learning About the Dangers of Sharing Data
(Journal article; Peer reviewed, 2022)Dark patterns refer to tricks built into websites and apps to manipulate users into acting unintentionally and detrimentally. An important issue is how such patterns might affect behaviour when actors are manoeuvred towards ... -
Data assimilation and statistical post-processing for numerical air quality predictions
(NR-notat;, Research report, 2014)This is a joint report based on work by NILU and NR on the use of data assimilation and statistical post-processing tools to improve the air quality prediction in the context of the Bedre Byluft programme. The objective ...