Essays about: "security networks"

Showing result 1 - 5 of 475 essays containing the words security networks.

  1. 1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Victor Mertala; Nordin Christopher; [2024]
    Keywords : CRYSTAL Framework; Tiny Twin; Tiny Digital Twin; Rebeca; Timed Rebeca; monitor; cyber attacks;

    Abstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE

  2. 2. Classifying femur fractures using federated learning

    University essay from Linköpings universitet/Statistik och maskininlärning

    Author : Hong Zhang; [2024]
    Keywords : Atypical femur fracture; Federated Learning; Neural Network; Classification;

    Abstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE

  3. 3. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy

    University essay from Göteborgs universitet/Graduate School

    Author : Elvira Tenggren; Isabella Asp; [2023-07-18]
    Keywords : SME; Sourcing; Manufacturing; Globalization; Regionalization; De-globalization; Reshoring; Network embeddedness; Efficiency-seeking; Security-seeking;

    Abstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE

  4. 4. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  5. 5. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE