Essays about: "literature review computer security"

Showing result 1 - 5 of 21 essays containing the words literature review computer security.

  1. 1. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  2. 2. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Elvis Etengeneng Tanyi; [2023]
    Keywords : Vulnerability Assessment; Home Networks; Vulnerability scanning; developing countries; Cameroon;

    Abstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE

  3. 3. IoT and smart grid : Communication security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : John Halldén; [2023]
    Keywords : ;

    Abstract : Electrical grids are a part of the critical infrastructure that society is reliant on for the running of everyday operations. The nature of the electrical grids results in them being located in different locations throughout the country to provide their services. READ MORE

  4. 4. Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature Review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Asier Iriarte Murgiondo; [2022]
    Keywords : authentication; multi-factor authentication; Universal 2nd Factor; U2F; Timebased One-time Password; TOTP; usability; comparison; autenticación; autenticación de múltiples factores; Universal 2nd Factor; U2F; Time-based One-time Password; TOTP; usabilidad;

    Abstract : Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. READ MORE

  5. 5. A Review of Literature and Public Datasets for the Application of Artificial Intelligence in the Railway Industry

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Mauro José Pappaterra; [2022]
    Keywords : ;

    Abstract : This Thesis project aims for a holistic overview of Artificial Intelligence (AI) applications in the railway industry. Our research covers diverse subdomains of railway systems such as traffic planning and scheduling, logistics and optimization, maintenance, safety and security, passenger experience, communication, and autonomous trains. READ MORE