Essays about: "securing a network"

Showing result 1 - 5 of 64 essays containing the words securing a network.

  1. 1. Using Social Media and Personality Predictions to Anticipate Startup Success

    University essay from Lunds universitet/Matematisk statistik

    Author : Daniel Stenson; [2023]
    Keywords : Machine Learning; Startup Success Predictions; Founder Personalities; Natural Language Processing; Social Media Analysis; Big 5 Personality Framework; Feed-forward Neural Network; XGBoost.; Mathematics and Statistics;

    Abstract : This thesis explores the potential of integrating predicted founder personalities, based on the Big 5 Personality Framework, into Machine Learning (ML) models to enhance the accuracy of early-stage startup success predictions. Leveraging Natural Language Processing (NLP) techniques, we extracted personality insights from founders' tweets, focusing on US startups funded between 2013 and 2015. READ MORE

  2. 2. Ethical Hacking of a Ring Doorbell

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Arnar Pétursson; [2023]
    Keywords : Security; Ethical hacking; Penetration testing; Internet of things; Threat modeling; Ring Doorbell.; Säkerhet; Etiskt hackande; Penetrationstestning; Sakernas internet; hotmodellering; Ring-dörrklockan.;

    Abstract : Internet of Things (IoT) devices have entered the home, offices, and other parts of everyday life at an alarming rate in recent years. A large company in the IoT space is Ring. They mostly make smart home security devices, with the mission of making neighborhoods safer, and their flagship product is the Ring doorbell. READ MORE

  3. 3. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. A Comparative Study of Machine Learning Algorithms for Angular Position Estimation in Assembly Tools

    University essay from KTH/Matematisk statistik

    Author : Henrik Fagerlund; [2023]
    Keywords : applied mathematics; circular fully convolutional network; nearest neighbour method; power tools; threaded fasteners; neural network; machine learning; convolution; tillämpad matematik; cirkulärt faltningsnätverk; närmaste granne-metod; elverktyg; skruvförband; neuralt nätverk; maskininlärning; faltning;

    Abstract : The threaded fastener is by far the most common method for securing components together and plays a significant role in determining the quality of a product. Atlas Copco offers industrial tools for tightening these fasteners, which are today suffering from errors in the applied torque. READ MORE