Essays about: "Computer Network Security."

Showing result 6 - 10 of 117 essays containing the words Computer Network Security..

  1. 6. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  2. 7. Fog detection using an artificial neural network

    University essay from Lunds universitet/Matematisk statistik

    Author : Quanwei Li; Tiancheng Ma; [2023]
    Keywords : Machine Learning; Deep Learning; Image Analysis; Computer Vision; Mathematics and Statistics;

    Abstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE

  3. 8. Enhancing an Existing Attack Projection System with Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mikael Kolanowski; [2023]
    Keywords : Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Abstract : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. READ MORE

  4. 9. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  5. 10. Selective Kernel Network based Crowding Counting and Crowd Density Estimation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jinchen Liu; [2023]
    Keywords : Crowding Counting; Convolution Neural Network; Selective kernel; Trängselräkning; konvolutionsneuralnätverk; Selektiv kärna;

    Abstract : Managing crowd density has become an immense challenge for public authorities due to population growth and evolving human dynamics. Crowd counting estimates the number of individuals in a given area or scene, making it a practical technique applicable in real-world scenarios such as surveillance and traffic control. READ MORE