Essays about: "Attack simulering"

Showing result 11 - 14 of 14 essays containing the words Attack simulering.

  1. 11. AUTOSARLang: Threat Modeling and Attack Simulation for Vehicle Cybersecurity

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Asmelash Girmay Mesele; [2018]
    Keywords : vehicular cybersecurity; threat model; attack simulation; AUTOSAR Adaptive Platform; vehicular cybersecurity; hot modell; attack simulering; AUTOSAR Adaptiv plattform;

    Abstract : The rapid growth and development of the Information and Communications Technology attract many industries including the automotive industry. Since the last four decades, the automotive engineering has been impacted by the Information Technology. READ MORE

  2. 12. Simulation of fatigue crack growth in coated cemented carbide milling inserts

    University essay from KTH/Hållfasthetslära (Avd.)

    Author : André Tengstrand; [2017]
    Keywords : ;

    Abstract : The aim of this work is to create a nite element model that simulates fatigue crack growth in coated cemented carbide milling inserts. A typical fatigue wear of coated milling tools are comb crack formation on the cutting edges of the tool inserts. Comb cracks initiate from pre-existent cooling cracks in the coating layers. READ MORE

  3. 13. Evaluation of a CFD method for estimating aerodynamic loads on external stores on JAS 39 Gripen

    University essay from Institutionen för fysik

    Author : Jakob Öhrman; [2011]
    Keywords : aerodynamic loads; CFD; computational fluid dynamics; simulation; aircraft; external stores; scaling; Saab Aerosystems; JAS 39 Gripen; aerodynamik; luftlaster; CFD; numerisk strömningsmekanik; simulering; flygplan; yttre utrustning; skalning; Saab Aerosystems; JAS 39 Gripen;

    Abstract : Loads determination for external stores on fighter aircraft is an important task for manufacturers in ensuring the safe operation of their aircraft. Due to the large number of possible store combinations, wind tunnel tests – the primary approach to obtaining loads data – cannot be performed for all configurations. READ MORE

  4. 14. Security and Performance Analysis of Topology-Based Intrusion Detection System in Ad Hoc Networks

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : UMUNNA CHRISTIAN CHEZZ CHETACHI; [2009]
    Keywords : Ad-hoc networks; cluster topology; Intrusion detection system; jammer attack Security;

    Abstract : As Wireless ad-hoc Networks are becoming an increasingly emerging technology taking a centre stage in exciting research areas which has attracted many research attentions in communication systems, the need for efficient intrusion detection techniques to enhance network security and privacy has gained significant prominence. Intrusion detection systems(IDS) in ad- hoc networks provides an effective method to improve the security, energy efficiency of transmission nodes allowing better spatial reuse of the wireless channel and control over network resources in order to optimize node security and the transmit power thereby maintaining network connectivity. READ MORE