TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
5 | |
5G-IoT | |
A | |
Active learning | |
Adaptive Authentication | |
Adaptive Security | |
Advanced Persistent Threats | |
advanced students | |
Adversarial Training | |
Age Detection | |
Age Determination | |
AI | |
AI adoption | |
AI Safety | |
AI-assisted journalism · | |
algorithmic profiling | |
APT Mitigation | |
Architectural Transformation | |
Artificial Intelligence | |
Assessment | |
Assessments | |
Attack Mitigation | |
Augmented Reality | |
Automated adaptive test | |
automatiserte testar | |
B | |
Bayesian Network | |
Behavioural Biometrics | |
Benchmarking | |
BERT | |
Bias | |
Biometrics | |
Biometrics and neuroscience | |
Blood glucose prediction | |
C | |
Catch prediction | |
CNN | |
Code Review | |
Collective anomaly detection | |
Communication practices | |
Computational Pathology | |
Computer science | |
Computer Vision | |
computer-assisted | |
Computing Education | |
Concept Identification | |
Concept Inventory | |
Continuous Authentication | |
course planning | |
COVID-19 | |
Crime Scene Investigation | |
Criminal investigation | |
Critical Infrastructure | |
Critical Infrastructures | |
Critical sectors | |
Cryptographic Engineering | |
CS1 | |
CSIRT | |
Custom Scripting | |
Cyber resilience | |
Cyber security | |
Cyber Threat Intelligence | |
Cyberbullying | |
Cybercrime | |
Cybersecurity | |
Cybersecurity framework | |
D | |
Data ownership | |
DDoS attacks | |
Decentralized Identity | |
Deep learning | |
Deep-learning | |
Democracy | |
Didactics | |
Digital Forensics | |
Digital infrastructure | |
Digital twins | |
Digitalization | |
Disinformation | |
DistilBERT | |
Diversity Equity Inclusion | |
Drawing | |
Dynamic Risk Assessment | |
E | |
Editorial tool | |
Education | |
educational approaches | |
Educational practices | |
Egen-vurdering | |
eGovernment | |
electronic health record | |
emergency room | |
emotions | |
Enterprise modelling | |
Ethical challenges | |
Examiners’ Perspective | |
Explainable AI | |
Exploratory research | |
F | |
Fact-checking | |
Federated Learning | |
Feedback Fruits | |
Fisheries | |
Flowguard | |
Focused thinking | |
Forensic Analysis | |
Forensic readiness | |
Formal logic | |
Fuzzing | |
førsteårsstudent | |
G | |
Gender | |
Generative AI | |
Grades | |
Gradient Descent | |
Group dynamics | |
GRU | |
H | |
Head Cameras | |
Health Care Education | |
Healthcare | |
Healthcare Examples | |
Healthcare Security | |
Healthcare System | |
Helsenorge | |
Helseplattformen | |
Hepatic Veins | |
Higher Education | |
Higher ICT education | |
human-centered AI | |
Hverandre-vurdering | |
I | |
Image data | |
Image filters | |
Incident Response | |
Incident Response Tools | |
industrial control system | |
informatikk | |
informatikkdidaktikk | |
information overload | |
information security | |
Information systems | |
Information technology | |
Intended Learning Outcomes (ILOs) | |
Internasjonalisering | |
Internet of Medical Things | |
Internet of Things security | |
Introduction to Programming | |
Introductory Programming | |
intrusion detection | |
Investigation | |
IoT Devices | |
IS modelling | |
IT Education | |
IT Educators | |
IT security | |
J | |
Justifications | |
K | |
Keystroke Dynamics | |
KI | |
Kreativitet | |
Kunnskapsmedarbeidere | |
Kunstig intelligens | |
L | |
Large language models | |
Law enforcement | |
Leadership | |
Learning Experience | |
Literature Review | |
Live Video Streaming | |
LLMs | |
LSTM-2 | |
M | |
Machine learning | |
Manikin | |
Mapping study | |
marking | |
Master Theses | |
matematikkdidaktikk | |
Medical Information | |
Microsoft Copilot Chat | |
Misinformation | |
Mitral valve | |
Model Accuracy | |
Multi-class classification | |
Multi-Task Learning | |
Multimedia analytics | |
Multimedia application | |
Multimedia Verification | |
Multimodel | |
Municipality | |
N | |
News | |
Norwegian enterprises | |
Nudging | |
O | |
Online Survey | |
operational technology | |
Optimization | |
P | |
Pandemic | |
Pedagogy | |
Peer Assessment | |
Peer Code Assessment | |
Peer Code Review (PCR) | |
perception | |
phishing | |
physicians | |
Physiological modelling | |
pilot study | |
Platform | |
Portal Veins | |
Poster | |
Prior Knowledge | |
Privacy | |
Privacy-Preserving | |
problemløysing | |
programmering | |
Programming Languages | |
programming paradigms | |
Programming visualisation | |
Projection | |
Projection Mapping | |
Proof checking | |
prosjekt | |
Prosjektbasert læring | |
public organization | |
Public sphere | |
Q | |
Qualitative study | |
R | |
Randomized control trial | |
Real-life problems | |
Recommender systems | |
Remote Healthcare | |
Remote Patient Monitoring | |
Resilience | |
ResNet-50 | |
Responsible Artificial Intelligence | |
Responsible Digitalization | |
Restructuring activities | |
Retrieval augmented generation | |
Reverse engineering | |
RoBERTa | |
Role Models | |
S | |
Security | |
Security and Safety | |
Security Architecture | |
Security Automation | |
Security awareness | |
Security Engineering for Machine Learning | |
Security Frameworks | |
Security Operations | |
Security Orchestration | |
Security Policy Development | |
Security Skills Gap | |
Security Tools | |
Segmentation | |
Self-Regulated Learning | |
Serious Games | |
Signal processing | |
Smart Grid | |
Social media | |
sociotechnical theory | |
Software | |
Software modeling | |
STEM-utdanning | |
Student Engagement | |
student involvement | |
Student Perspective | |
students as developers | |
Survey investigation | |
Sustainability | |
Sustainability Awareness Framework | |
Sustainability Design | |
SwinUNETR | |
Switching Functions | |
Systematic Literature Review | |
T | |
Teaching | |
Team Situational Awareness | |
technostress | |
Ternary Logic | |
Testing | |
Text data | |
Thinking classrooms | |
Threat Detection | |
Threat Hunting | |
Threat Modeling | |
tilbakemeldingsferdighet | |
Transparency | |
Trust | |
Tverrfaglighet | |
U | |
Ultrasound | |
Undergraduate teaching | |
Unknown Instruction Set Architecture | |
Use cases | |
V | |
Verification | |
Vilenkin-Chrestenson Transform | |
Virtual Reality | |
ViT | |
vurdering | |
W | |
Web 3.0 | |
workplace | |
X | |
XAI |