Essays about: "thesis on network security"

Showing result 1 - 5 of 228 essays containing the words thesis on network security.

  1. 1. Assessing blockchain technology for Transport Data Logger

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Björn Johansson; [2018]
    Keywords : blockchain; transport data logger; hyperledger; hyperledger fabric; byzantine fault tolerance; bft; supply chain; transport chain; permissioned; permissionless; documental truth; historical truth; immutability; security; log data; Technology and Engineering;

    Abstract : A proof of concept permissioned blockchain system that holds data from the Transport Data Logger, TDL, was developed. Transport chain actors who hand off TDL-equipped goods between one another use the TDL app to upload a digital handoff containing their identities and log data from and signed by the TDL to a Hyperledger Fabric blockchain network. READ MORE

  2. 2. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Andreas Messing; [2018]
    Keywords : vehicular communication; network; security; privacy;

    Abstract : Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. READ MORE

  3. 3. Optimization of Electromechanical Studies for the Connection of Hydro Generation

    University essay from KTH/Elkraftteknik

    Author : Mathieu GROULT; [2018]
    Keywords : Active power response time; EUROSTAG; Hydraulic power plant; Grid codes; MATLAB; Nuclear power plant; Rotor angle stability; aktiv effekt tidrespons; EUROSTAG; hydraulisk kraftverk; nätkoder; MATLAB; kärnkraftverk; rotorn vinkelstabilitet;

    Abstract : The current model for electricity generation is based on power plants connected to the transmission network. This provides electricity to the distribution network and after that to the consumers. READ MORE

  4. 4. Mapping out dependencies in network components in critical infrastructure

    University essay from Linköpings universitet/Programvara och system

    Author : Karl Andersson; [2018]
    Keywords : critical infrastructure; system dependencies; scada network; dependency analysis; mapping components; system modeling;

    Abstract : Companies that operate with critical infrastructure face a growing threat from cyber-attacks while at the same time the development in the business is rapidly moving towards a higher level of digitalization. A common type of system in critical infrastructure is supervisory control and data acquisition systems, these systems have properties that can affect their security and will therefore serve as the basis for this thesis work. READ MORE

  5. 5. Tampering Classification Using Accelerometer Data

    University essay from Lunds universitet/Matematik LTH

    Author : Mikael Lindholm; Linus Lindgren; [2017]
    Keywords : machine learning; classification; accelerometer; support vector machine; doorstation; tampering detection; Mathematics and Statistics;

    Abstract : Network Video Door Stations are IP-based door stations for two-way communication, identification, and remote entry control. They have a number of different sensors e.g video, audio and accelerometer that can measure external data. READ MORE