Essays about: "thesis for security system"
Showing result 1 - 5 of 912 essays containing the words thesis for security system.
-
1. "The Competition of Values in the European Arrest Warrant Tracing the Conflict and Prioritization Between Collective Security and Individual Justice Within Case Law of the CJEU"
University essay from Göteborgs universitet/Juridiska institutionenAbstract : The European Arrest Warrant system is built on balancing between individual justice, which safeguards the right to a fair trial of subjects to extradition, and collective security, which seeks to ensure public safety and effective law enforcement. This thesis provides for an analysis of this balance and its evolution, exploring how the prioritization of individual justice and collective security, as manifested in the EAW, have shifted through the evolutive interpretation of the Court of Justice of the European Union. READ MORE
-
2. INTRODUCTION OF CYBERSECURITY INTO VERIFICATION PROCESSES FOR CONSTRUCTION EQUIPMENT : Cybersecurity Verification
University essay from Mälardalens universitet/Inbyggda systemAbstract : Technology is evolving at a very fast pace in various domains, including the construction equipment industry. Although the increased automation and connectivity in different products, such as vehicles, heavy machinery, and many others, have advantages, they also have disadvantages. READ MORE
-
3. Physical Layer Security for MIMOTransmission of Short PacketCommunications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE
-
4. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
5. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE