Essays about: "literature review on network security"
Showing result 1 - 5 of 48 essays containing the words literature review on network security.
-
1. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE
-
2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
3. En kritisk granskning av cykelnätet i Malmös innerstad utifrån ett brukarperspektiv
University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)Abstract : Uppsatsen utreder brister i Malmös cykelnät från ett brukarperspektiv genom en personlig cykling av alla redovisade cykelvägar i centrala Malmö. Undersökningen redovisas genom kartläggning av bristerna, redovisning av de olika vägtyper som cykelvägarna utgörs av samt en noggrannare granskning av de så kallade pendelstråken och dess kvaliteter. READ MORE
-
4. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
5. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE