Essays about: "Attack Simulations"

Showing result 1 - 5 of 50 essays containing the words Attack Simulations.

  1. 1. Wall-Resolved and Wall-Modelled LES for a NACA4412 Wing Profile in OpenFOAM

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Nikolaos Charisoudis; [2024]
    Keywords : ;

    Abstract : The purpose of this study is to perform computational fluid dynamics (CFD) simulationfor an incompressible flow around an airfoil and investigate the aerodynamicproperties for different Reynolds numbers (400, 000 and 1, 000, 000) based on the chordlength, at the moderate angle of attack (AoA) of 5o . For this purpose a detailedevaluation of wall-resolved and wall-modelled large-eddy simulations (LES) wereconducted for the NACA4412 wing profile. READ MORE

  2. 2. Methods and Purposes of Aerodynamic Correlation in Formula Student

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Alix Le Bastard; [2023]
    Keywords : Technology and Engineering;

    Abstract : This thesis investigates how methods of aerodynamic validation can assist a formula student team in designing their aerodynamic package. When de- signing their aerodynamic components, formula student team mostly rely on CFD software simulations, but there is no guarantee that the simulations de- pict properly the physical behaviour of the airflow around the car. READ MORE

  3. 3. Observability in Machine Learning based Intrusion Detection Systems for RPL-based IoT

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Malin Strand; [2023]
    Keywords : ;

    Abstract : As IoT devices become more and more present in our daily lives, security in IoT networks has become a major concern. A promising approach for detecting attacks is the use of machine learning based Intrusion Detection Systems (IDSs). The attack studied in this thesis is the blackhole attack, an attack causing parts of the network to disconnect. READ MORE

  4. 4. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Klasson Landin; Truls Julborg; [2023]
    Keywords : Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE

  5. 5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE