Essays about: "thesis on network security"

Showing result 16 - 20 of 426 essays containing the words thesis on network security.

  1. 16. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  2. 17. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  3. 18. Detecting Fraud in Affiliate Marketing: Comparative Analysis of Supervised Machine Learning Algorithms

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oskar Ahlqvist; [2023]
    Keywords : Fraud detection; Machine learning; Random Forest; support vector machine; Logistic Regression; Classification models; Affiliate marketing;

    Abstract : Affiliate marketing has become a rapidly growing part of the digital marketing sector. However, fraud in affiliate marketing raises a serious threat to the trust and financial stability of the involved parties. READ MORE

  4. 19. Impact of interfering rouge access points on modulationand coding in IoT network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Amgad Shaher Saif; [2023]
    Keywords : Rogue access point; internet of things; modulation and coding scheme; round trip time; radio frequency interference; network latency; network security.; Obehörig åtkomstpunkt; sakernas internet; modulation och kodningsschema; round trip time; radiofrekvensinterferens; nätverkslatens; nätverkssäkerhet.;

    Abstract : This Bachelor thesis presents an in-depth investigation into the effects of RogueAccess Point interference within Internet of Things networks. The study focuses onthe impact of rogue APs on the modulation and coding scheme indices, round triptime, and overall network performance. READ MORE

  5. 20. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE