Essays about: "Design of Computer Network Security"
Showing result 1 - 5 of 22 essays containing the words Design of Computer Network Security.
-
1. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE
-
2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
3. Developing a modular, high-interaction honeypot using container virtualization
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE
-
4. Network Hardening of Multilayer Switch
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE
-
5. FPGA Implementation of an Anonymization Algorithm
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : With the large amount of surveillance cameras in our public spaces there has been much discussion about their effects on privacy. Axis communications has an algorithm that tries to remedy this by making it hard to see who is in an image but still have it possible for a neural network to detect that there is a person present. READ MORE