Essays about: "thesis on standard service"

Showing result 6 - 10 of 139 essays containing the words thesis on standard service.

  1. 6. Dimensioning Microservices on Kubernetes Platforms Using Machine Learning Techniques

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Adam Rubak; [2023]
    Keywords : Kubernetes; dimensioning; scaling; resource management; horizontal pod autoscaler; machine learning; Kubernetes; dimensionering; skalning; resurshantering; horisontell pod autoscaler; maskininlärning;

    Abstract : In recent years, cloud computing and containerization have become increasingly popular for various applications. However, optimizing resource usage and minimizing costs while providing reliable and efficient service to users can be a challenge. One such challenge is scaling containers according to the current system load. READ MORE

  2. 7. Analysis of Performance Parameters for Service Assurance in Radio Access Networks

    University essay from KTH/Hälsoinformatik och logistik

    Author : Daryell Raymat; Mohammed Chaker; [2023]
    Keywords : Key performance indicator in networks; python; data visualisation; cellular network; self-health care; machine learning; Telenor; parameter analysis.; Nyckelprestandaindikator i nätverk; python; datavisualisering; mobilnätverk; själv-hälsovård; maskininlärning; Telenor; parameteranalys.;

    Abstract : During the thesis project, an evaluation tool was developed for Telenor. This tool identifies the most reliable cell within a site based on its standard deviation and systematically ranks the performance of each cell using key performance indicators (KPIs). READ MORE

  3. 8. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  4. 9. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE

  5. 10. Next Generation Access Control as a support core system in the Arrowhead Framework

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ilaman Esenov; [2022]
    Keywords : ;

    Abstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE