Essays about: "Relay Network"
Showing result 11 - 15 of 70 essays containing the words Relay Network.
-
11. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
12. Deanonymizing Onion Services byIntroducing Packet Delay
University essay from Blekinge Tekniska HögskolaAbstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE
-
13. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE
-
14. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. READ MORE
-
15. Dynamic Routing and Load Balancing Techniques for Integrated Access and Backhaul Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Mobile networks have rapidly evolved over decades, and have arrived at the fifth generation (5G) system in recent years. From 2019, companies started to bring 5G networks into business, providing higher data rates, lower latency, and larger network capacity to the world. READ MORE