Essays about: "securing a network"
Showing result 1 - 5 of 64 essays containing the words securing a network.
-
1. Using Social Media and Personality Predictions to Anticipate Startup Success
University essay from Lunds universitet/Matematisk statistikAbstract : This thesis explores the potential of integrating predicted founder personalities, based on the Big 5 Personality Framework, into Machine Learning (ML) models to enhance the accuracy of early-stage startup success predictions. Leveraging Natural Language Processing (NLP) techniques, we extracted personality insights from founders' tweets, focusing on US startups funded between 2013 and 2015. READ MORE
-
2. Ethical Hacking of a Ring Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE
-
3. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
5. A Comparative Study of Machine Learning Algorithms for Angular Position Estimation in Assembly Tools
University essay from KTH/Matematisk statistikAbstract : The threaded fastener is by far the most common method for securing components together and plays a significant role in determining the quality of a product. Atlas Copco offers industrial tools for tightening these fasteners, which are today suffering from errors in the applied torque. READ MORE