Essays about: "Design of Computer Network Security"

Showing result 1 - 5 of 22 essays containing the words Design of Computer Network Security.

  1. 1. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Javier Ferre Martin; [2023]
    Keywords : Space Situational Awareness; Deep Learning; Convolutional Neural Networks; FieldProgrammable Gate Arrays; System-On-Chip; Computer Vision; Dynamic Partial Reconfiguration; High-Level Synthesis; Rymdsituationstänksamhet; Djupinlärning; Konvolutionsnätverk; Omkonfigurerbara Field-Programmable Gate Arrays FPGAs ; System-On-Chip SoC ; Datorseende; Dynamisk partiell omkonfigurering; Högnivåsyntes.;

    Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE

  2. 2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  3. 3. Developing a modular, high-interaction honeypot using container virtualization

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Keywords : honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Abstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE

  4. 4. Network Hardening of Multilayer Switch

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Peter Pekkanen; David Söderman; [2021]
    Keywords : ;

    Abstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE

  5. 5. FPGA Implementation of an Anonymization Algorithm

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Kjellman; Rehenuma Tarannum; [2020]
    Keywords : FPGA anonymization privacy anonymization filter spacial filter; Technology and Engineering;

    Abstract : With the large amount of surveillance cameras in our public spaces there has been much discussion about their effects on privacy. Axis communications has an algorithm that tries to remedy this by making it hard to see who is in an image but still have it possible for a neural network to detect that there is a person present. READ MORE