NIKT 2024: NORWEGIAN ICT CONFERENCE FOR RESEARCH AND EDUCATION
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

5
5G-IoT
A
Active learning
Adaptive Authentication
Adaptive Security
Advanced Persistent Threats
advanced students
Adversarial Training
Age Detection
Age Determination
AI
AI adoption
AI Safety
AI-assisted journalism ·
algorithmic profiling
APT Mitigation
Architectural Transformation
Artificial Intelligence
Assessment
Assessments
Attack Mitigation
Augmented Reality
Automated adaptive test
automatiserte testar
B
Bayesian Network
Behavioural Biometrics
Benchmarking
BERT
Bias
Biometrics
Biometrics and neuroscience
Blood glucose prediction
C
Catch prediction
CNN
Code Review
Collective anomaly detection
Communication practices
Computational Pathology
Computer science
Computer Vision
computer-assisted
Computing Education
Concept Identification
Concept Inventory
Continuous Authentication
course planning
COVID-19
Crime Scene Investigation
Criminal investigation
Critical Infrastructure
Critical Infrastructures
Critical sectors
Cryptographic Engineering
CS1
CSIRT
Custom Scripting
Cyber resilience
Cyber security
Cyber Threat Intelligence
Cyberbullying
Cybercrime
Cybersecurity
Cybersecurity framework
D
Data ownership
DDoS attacks
Decentralized Identity
Deep learning
Deep-learning
Democracy
Didactics
Digital Forensics
Digital infrastructure
Digital twins
Digitalization
Disinformation
DistilBERT
Diversity Equity Inclusion
Drawing
Dynamic Risk Assessment
E
Editorial tool
Education
educational approaches
Educational practices
Egen-vurdering
eGovernment
electronic health record
emergency room
emotions
Enterprise modelling
Ethical challenges
Examiners’ Perspective
Explainable AI
Exploratory research
F
Fact-checking
Federated Learning
Feedback Fruits
Fisheries
Flowguard
Focused thinking
Forensic Analysis
Forensic readiness
Formal logic
Fuzzing
førsteårsstudent
G
Gender
Generative AI
Grades
Gradient Descent
Group dynamics
GRU
H
Head Cameras
Health Care Education
Healthcare
Healthcare Examples
Healthcare Security
Healthcare System
Helsenorge
Helseplattformen
Hepatic Veins
Higher Education
Higher ICT education
human-centered AI
Hverandre-vurdering
I
Image data
Image filters
Incident Response
Incident Response Tools
industrial control system
informatikk
informatikkdidaktikk
information overload
information security
Information systems
Information technology
Intended Learning Outcomes (ILOs)
Internasjonalisering
Internet of Medical Things
Internet of Things security
Introduction to Programming
Introductory Programming
intrusion detection
Investigation
IoT Devices
IS modelling
IT Education
IT Educators
IT security
J
Justifications
K
Keystroke Dynamics
KI
Kreativitet
Kunnskapsmedarbeidere
Kunstig intelligens
L
Large language models
Law enforcement
Leadership
Learning Experience
Literature Review
Live Video Streaming
LLMs
LSTM-2
M
Machine learning
Manikin
Mapping study
marking
Master Theses
matematikkdidaktikk
Medical Information
Microsoft Copilot Chat
Misinformation
Mitral valve
Model Accuracy
Multi-class classification
Multi-Task Learning
Multimedia analytics
Multimedia application
Multimedia Verification
Multimodel
Municipality
N
News
Norwegian enterprises
Nudging
O
Online Survey
operational technology
Optimization
P
Pandemic
Pedagogy
Peer Assessment
Peer Code Assessment
Peer Code Review (PCR)
perception
phishing
physicians
Physiological modelling
pilot study
Platform
Portal Veins
Poster
Prior Knowledge
Privacy
Privacy-Preserving
problemløysing
programmering
Programming Languages
programming paradigms
Programming visualisation
Projection
Projection Mapping
Proof checking
prosjekt
Prosjektbasert læring
public organization
Public sphere
Q
Qualitative study
R
Randomized control trial
Real-life problems
Recommender systems
Remote Healthcare
Remote Patient Monitoring
Resilience
ResNet-50
Responsible Artificial Intelligence
Responsible Digitalization
Restructuring activities
Retrieval augmented generation
Reverse engineering
RoBERTa
Role Models
S
Security
Security and Safety
Security Architecture
Security Automation
Security awareness
Security Engineering for Machine Learning
Security Frameworks
Security Operations
Security Orchestration
Security Policy Development
Security Skills Gap
Security Tools
Segmentation
Self-Regulated Learning
Serious Games
Signal processing
Smart Grid
Social media
sociotechnical theory
Software
Software modeling
STEM-utdanning
Student Engagement
student involvement
Student Perspective
students as developers
Survey investigation
Sustainability
Sustainability Awareness Framework
Sustainability Design
SwinUNETR
Switching Functions
Systematic Literature Review
T
Teaching
Team Situational Awareness
technostress
Ternary Logic
Testing
Text data
Thinking classrooms
Threat Detection
Threat Hunting
Threat Modeling
tilbakemeldingsferdighet
Transparency
Trust
Tverrfaglighet
U
Ultrasound
Undergraduate teaching
Unknown Instruction Set Architecture
Use cases
V
Verification
Vilenkin-Chrestenson Transform
Virtual Reality
ViT
vurdering
W
Web 3.0
workplace
X
XAI