Essays about: "Computer Network Security."
Showing result 11 - 15 of 117 essays containing the words Computer Network Security..
-
11. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE
-
12. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE
-
13. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE
-
14. Log Anomaly Detection of Structured Logs in a Distributed Cloud System
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : As computer systems grow larger and more complex, the task of maintaining the system and finding potential security threats or other malfunctions become increasingly hard. Traditionally, this has had to be done by manually examining the logs. READ MORE
-
15. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control
University essay from Uppsala universitet/Avdelningen för visuell information och interaktionAbstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE