Essays about: "preventing network attacks"
Showing result 1 - 5 of 10 essays containing the words preventing network attacks.
-
1. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE
-
2. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE
-
3. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE
-
4. Machine Learning in Defensive IT Security: Early Detection of Novel Threats
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of technology leads to a rise in cybercrime, hence cybersecurityis of unprecedented significance, especially for businesses. Defensiveand forensic IT security is a rather niche field in IT security but it issurely going to grow. It focuses on preventing attacks by good design standardsand the education of persons. READ MORE
-
5. A Hardware-based Secure Communication Module to Protect Internet Connected Vehicles
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Information technology has not only been a driving force of the car industries within the last couple of years but it even seems to be of growing importance for the unforeseeable future. The inclusion of information technology is accompanied with the promise of increased comfort and the prospect that future autonomous and connected cars will become a place to spend our time while being on the road. READ MORE