• A Queue Model for Reliable Forecasting of Future CPU Consumption 

      Hammer, Hugo Lewi; Yazidi, Anis; Bratterud, Alfred; Haugerud, Hårek; Feng, Boning (Journal article; Peer reviewed, 2017)
      Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes ...
    • Achieving Connectivity between Wide Areas Through Self-Organising Robot Swarms using Embodied Evolution 

      Erik Aaron, Hansen; Nichele, Stefano; Yazidi, Anis; Haugerud, Hårek; Abolpour Mofrad, Asieh; Alcocer, Alex (Chapter; Peer reviewed, 2018)
      Abruptions to the communication infrastructuremight occur occasionally, where manual intervention by dedi-cated personnel is needed to fix the interruptions, restoring com-munication abilities. However, sometimes this can ...
    • Adaptive Pursuit Learning for Energy‐efficient Target Coverage in Wireless Sensor Networks 

      Upreti, Ramesh; Rauniyar, Ashish; Kunwar, Jeevan; Haugerud, Hårek; Engelstad, Paal E.; Yazidi, Anis (Concurrency and Computation: Practice and Experience; e5975, Journal article; Peer reviewed, 2020-08-25)
      With the proliferation of technologies such as wireless sensor networks (WSNs) and the Internet of things (IoT), we are moving towards the era of automation without any human intervention. Sensors are the principal components ...
    • Affinity Aware-Scheduling of Live Migration of Virtual Machines Under Maintenance Scenarios. 

      Yazidi, Anis; Ung, Frederik; Haugerud, Hårek; Begnum, Kyrre Matthias (Proceedings of the IEEE Symposium on Computers and Communications;2019 IEEE Symposium on Computers and Communications (ISCC), Conference object, 2019)
      During maintenance and disaster recovery scenarios, Virtual Machine (VM) inter-site migrations usually take place over limited bandwidth–typically Wide Area Network (WAN)–which is highly affected by the amount of inter-VM ...
    • Analyzing automated activity and social deception on Twitter during the 2021 Norwegian election 

      Aune, Sverre Øystein (ACIT;2022, Master thesis, 2022)
      The growing concern of fake news and social bots as threats to democracy leaves society with motivation to investigate and research its presence. In this thesis, we look into social bot research and try to understand the ...
    • Analyzing the compression of Opera Mini TM traffic 

      Østen, Stian (Master thesis, 2008)
      Opera Mini TM is a mobile web browser. It was developed for mobile phones incapable of running regular web browsers and released globally in January 2006. It has gained great popularity and can be downloaded free of ...
    • Autonomous configuration of network parameters in operating systems using evolutionary algorithms 

      Gembala, Bartosz Gembala; Yazidi, Anis; Haugerud, Hårek; Nichele, Stefano (Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems;, Chapter; Peer reviewed, 2018)
      By default, the Linux network stack is not configured for highspeed large file transfer. The reason behind this is to save memory resources. It is possible to tune the Linux network stack by increasing the network buffers ...
    • The Concept of Workload Delay as a Quality-of-Service Metric for Consolidated Cloud Environments with Deadline Requirements 

      Tasoulas, Evangelos; Hammer, Hugo Lewi; Haugerud, Hårek; Yazidi, Anis; Bratterud, Alfred; Feng, Boning (Chapter; Peer reviewed, 2017)
      Virtual Machine (VM) consolidation in the cloud has received significant research interest. A large body of approaches for VM consolidation in data centers resort to variants of the bin packing problem which tries to ...
    • Cost efficient batch processing in amazon cloud with deadline awareness 

      Tamrakar, Kabin; Yazidi, Anis; Haugerud, Hårek (Advanced Information Networking and Applications;2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Journal article; Peer reviewed, 2017)
      Amazon spot instances have become a very popular alternative for cost-saving in the cloud. The spot instances are prone to abrupt termination whenever the spot market price exceeds the bid price. In this paper, spot instances ...
    • A Decentralized Approach for Homogenizing Load Distribution in Cloud Data Center Based on Stable Marriage Matching 

      Sangar, Disha; Haugerud, Hårek; Yazidi, Anis; Begnum, Kyrre Matthias (MEDES '19: Proceedings of the 11th International Conference on Management of Digital EcoSystems;, Conference object, 2019)
      Running a sheer virtualized data center with the help of Virtual Machines (VM) is the de facto-standard in modern data centers. Live migration offers immense flexibility opportunities as it endows the system administrators ...
    • Detecting Yo-Yo DoS attack in acontainer-based environment 

      Danielsen, Viktor (ACIT;2021, Master thesis, 2021)
      Denial-of-Service (DoS) attacks are an ever persistent treath to IT environ-ments and it occurs today at an ever-increasing rate from year to year. Asthe world develops and companies migrate their systems from private ...
    • Detection of fake domain names in e-mails 

      Gorboe, Anders (ACIT;2022, Master thesis, 2022)
      Phishing is social engineering attack that inflicts damages of several billion dollars each year. Phishing has increased yearly in frequency and in complexity bringing new and more clever schemes for hackers to deceive ...
    • Does Clicker Use Improve Exam Scores? A Controlled Randomized Experiment in a Bachelor-Level Course in Software Engineering 

      Kvadsheim, Reidar; Haugerud, Hårek; Hammer, Hugo Lewi; Bratterud, Alfred; Habib, Laurence (Journal article, 2015)
      This paper reports a study of clicker use within an undergraduate course in Operating Systems. It is based on a controlled, randomized experiment with a crossover design that measures learning outcomes by means of test ...
    • DoS and DDoS mitigation using Variational Autoencoders 

      Bårli, Eirik Molde; Yazidi, Anis; Viedma, Enrique Herrera; Haugerud, Hårek (Computer Networks;Volume 199, 9 November 2021, 108399, Peer reviewed; Journal article, 2021-09-01)
      DoS and DDoS attacks have been growing in size and number over the last decade and existing solutions to mitigate these attacks are largely inefficient. Compared to other types of malicious cyber attacks, DoS and DDoS ...
    • A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization 

      Haugerud, Hårek; Tran, Huy Nhut; Aitsaadi, Nadjib; Yazidi, Anis (Future generations computer systems;Volume 124, November 2021, Peer reviewed; Journal article, 2021-06-12)
      A Network Intrusion Detection System (NIDS) is a fundamental security tool. However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded state, incoming and outgoing packets in the network might ...
    • Effective live migration of virtual machines using partitioning and affinity aware-scheduling 

      Yazidi, Anis; Ung, Fredrik; Haugerud, Hårek; Begnum, Kyrre (Computers and Electrical Engineering;volume 69 (2018), Journal article; Peer reviewed, 2018-07-11)
      During maintenance and disaster recovery scenarios, Virtual Machine (VM) inter-site migrations usually take place over limited bandwidth—typically Wide Area Network (WAN)—which is highly affected by the amount of inter-VM ...
    • Energy Efficient Target Coverage in Wireless Sensor Networks Using Adaptive Learning 

      Rauniyar, Ashish; Kunwar, Jeevan; Haugerud, Hårek; Yazidi, Anis; Engelstad, Paal E. (Communications in Computer and Information Science;volume 1130, Journal article; Peer reviewed; Book chapter, 2019)
      Over the past few years, innovation in the development of Wireless Sensor Networks (WSNs) has evolved rapidly. WSNs are being used in many application fields such as target coverage, battlefield surveillance, home security, ...
    • Evading a Machine Learning-based Intrusion Detection System through Adversarial Perturbations 

      Fladby, Torgeir; Haugerud, Hårek; Nichele, Stefano; Begnum, Kyrre; Yazidi, Anis (RACS: Research in Applied Computation Symposium; RACS '20: International Conference on Research in Adaptive and Convergent Systems, Chapter; Peer reviewed; Conference proceeding, 2020-10)
      Machine-learning based Intrusion Detection and Prevention Systems provide significant value to organizations because they can efficiently detect previously unseen variations of known threats, new threats related to known ...
    • Exploring the Value of GANs for Synthetic Tabular Data Generation in Healthcare with a Focus on Data Quality, Augmentation, and Privacy 

      Pedersen, Maria Elinor (Master thesis, 2023)
      Artificial Intelligence has demonstrated immense potential in healthcare-related applications, paving the way for advancements in diagnosis, treatment, and patient care. However, data protection laws and regulations present ...
    • Generating synthetic VoIP traffic for analyzing redundant OpenBSD-Firewalls 

      Woernhard, Maurice David (Master thesis, 2006)
      Voice over IP, short VoIP, is among the fastest growing broadband technologies in the private and commercial sector. Compared to the Plain Old Telephone System (POTS), Internet telephony has reduced availability, measured ...