Essays about: "Privacy intrusion"

Showing result 1 - 5 of 13 essays containing the words Privacy intrusion.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. Differentially Private Random Forests for Network Intrusion Detection in a Federated Learning Setting

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Alexander Frid; [2023]
    Keywords : Machine Learning; Random Forest; Federated Learning; Differential Privacy; Maskininlärning; Random Forest; Federated Learning; Differential Privacy;

    Abstract : För varje dag som går möter stora industrier en ökad mängd intrång i sina IT-system. De flesta befintliga verktyg som använder sig utav maskininlärning är starkt beroende av stora mängder data, vilket innebär risker under dataöverföringen. READ MORE

  3. 3. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE

  4. 4. Data protection and personal integrity in the context of data processing for personalized advertising

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Donya Azimi; [2022]
    Keywords : EU-rätt;

    Abstract : It is concluded in this thesis that there are uncertainties on the framework of the right to data protection for several reasons. Firstly, the degree to which personal integrity must be protected by technology companies is not completely clear. READ MORE

  5. 5. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Karl Martin Stawe; [2021]
    Keywords : ;

    Abstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE