Essays about: "response time and security"
Showing result 1 - 5 of 84 essays containing the words response time and security.
-
1. The maritime dispute between Türkiye and Greece and its impact on government policy.
University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)Abstract : This paper sought to analyse which underlying motives impacted the stances and policies taken by Greece and Türkiye regarding their disputed maritime border. The maritime border consists of two distinct areas, the Aegean Sea, and the Eastern Mediterranean Sea. READ MORE
-
2. IT security: Exploring the Benefits of Cloud Computing for Incident Response
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This study examines the potential of Cloud Computing in enhancing incident response in IT security. It explores how cloud computing features, such as rapid elasticity and on-demand self-service, can positively impact IT infrastructure decisions during incident response scenarios. READ MORE
-
3. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE
-
4. Nodulation and biomass development of yellow and blue lucerne under pH stress
University essay from SLU/Dept. of Crop Production EcologyAbstract : Approximately 77% of global arable land use is devoted to forage cultivation, which is the basis for animal production and global food security. Therefore a sustainable and biologically diverse forage cultivation is needed. Feed for cattle needs to contain a good balance between fibre, energy and protein. READ MORE
-
5. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE