Advanced search

Showing result 1 - 5 of 22 essays matching the above criteria.

  1. 1. Evaluating Security Mechanisms of Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyang Zhou; [2023]
    Keywords : Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE

  2. 2. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  3. 3. Ethical hacking of Sennheiser smart headphones

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fuhao Huang; [2022]
    Keywords : Ethical hacking; smart headphones; Bluetooth; cyber security; Internet of Things; Etisk hackning; smarta hörlurar; Bluetooth; cybersäkerhet; Internet of Things;

    Abstract : The proliferation of IoT devices has brought our world closer than ever. However, because these devices can connect to the internet, they are also vulnerable to cyberattacks. IoT devices collect our personal information, so we must take IoT security seriously to protect our privacy. READ MORE

  4. 4. Securitizing the Alt-Right

    University essay from Lunds universitet/Statsvetenskapliga institutionen; Lunds universitet/Pedagogik; Lunds universitet/Master of Science in Global Studies; Lunds universitet/Graduate School

    Author : Zoi Savvidou; [2020]
    Keywords : Law and Political Science; Social Sciences;

    Abstract : Within the last decade, the alt-right movement has migrated from secluded corners of the internet into mainstream media. This migration, and subsequently gained following, challenges traditional views on security by bringing forth social actors that securitize, despite a lack of authority. READ MORE

  5. 5. A tool for visual analysis of permission-based data access on Android phones

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ulf Magnusson; [2019]
    Keywords : Privacy; Database; Stored procedure; MySQL; Visualization; Java; ORM; Hibernate; JFreeChart;

    Abstract : Privacy is a topic of ever-increasing interest in the modern, connected world. With the advent of smart phones, the boundary between internet and the personal sphere has become less distinct. Most users of smart phones have very vague ideas of how various apps intrude on their privacy. READ MORE