Essays about: "Attack"

Showing result 21 - 25 of 885 essays containing the word Attack.

  1. 21. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 22. Adversarial robustness of STDP-trained spiking neural networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Karl Lindblad; Axel Nilsson; [2023]
    Keywords : ;

    Abstract : Adversarial attacks on machine learning models are designed to elicit the wrong behavior from the model. One such attack on image classifiers are maliciously crafted inputs that, to the human eye, look untampered with but have been carefully altered to cause misclassification. READ MORE

  3. 23. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE

  4. 24. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

    University essay from Uppsala universitet/Datorteknik

    Author : Victoria Bull; [2023]
    Keywords : Internet of Things; IoT; intrusion detection; routing attacks;

    Abstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE

  5. 25. Methods and Purposes of Aerodynamic Correlation in Formula Student

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Alix Le Bastard; [2023]
    Keywords : Technology and Engineering;

    Abstract : This thesis investigates how methods of aerodynamic validation can assist a formula student team in designing their aerodynamic package. When de- signing their aerodynamic components, formula student team mostly rely on CFD software simulations, but there is no guarantee that the simulations de- pict properly the physical behaviour of the airflow around the car. READ MORE