Essays about: "secure network"

Showing result 1 - 5 of 309 essays containing the words secure network.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  3. 3. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  4. 4. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  5. 5. Assessing The Relationship Between Social Networks And Integration In The Labour Market In Sweden: A Case Study Of Somali And Bosnian Second-Generation Immigrants In Växjö

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Bahati George; [2023]
    Keywords : integration; immigrants; social networks; social capital;

    Abstract : The integration of immigrants has been a significant area of research, focusing on aspects such as employment, housing, and education for newly arrived community members. In recent years, scholarly attention has increasingly turned toward social networks and their influence on immigrant integration into the labor market of the host country. READ MORE