Essays about: "conclusion of network server"

Showing result 1 - 5 of 25 essays containing the words conclusion of network server.

  1. 1. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  2. 2. Gunshot Detection from Audio Streams in Portable Devices

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Linnea Bokelund; Ellen Grane; [2022]
    Keywords : machine learning; gunshot detection; convolutional neural networks; sound event detection; portable devices; Technology and Engineering;

    Abstract : Machine learning and artificial neural networks can be used to classify or detect specific sound events in audio signals. Gunshot detection is one use case for such networks and can be used to help law enforcement by alerting officers or triggering camera recordings. READ MORE

  3. 3. TLS Decryption in passive monitoring system with server private key

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Emil Käck; [2021]
    Keywords : TLS; Decryption; Passive monitoring; Server private key;

    Abstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE

  4. 4. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  5. 5. DevOps for Data Science System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhongjian Zhang; [2020]
    Keywords : Data science; DevOps; convolutional neural network; transfer learning;

    Abstract : Commercialization potential is important to data science. Whether the problems encountered by data science in production can be solved determines the success or failure of the commercialization of data science. Recent research shows that DevOps theory is a great approach to solve the problems that software engineering encounters in production. READ MORE