Essays about: "IT security algorithms evaluation"

Showing result 1 - 5 of 23 essays containing the words IT security algorithms evaluation.

  1. 1. Workflow-driven, dynamic authorization for Modular Automation systems

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Enna Basic; Ivan Radonjic; [2023]
    Keywords : industrial control systems; dynamic access control; authorization service; cyber security; modular automation;

    Abstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE

  2. 2. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  3. 3. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  4. 4. Performance analysis of adaptive streaming algorithms for a low-latency environment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Antonio Kevo; Albert Sjölund; [2022]
    Keywords : Technology and Engineering;

    Abstract : Streaming video over the internet can face issues when met with poor and varying network conditions, which can be especially noticeable when streaming live video such as security footage or video calling. To handle this, there exists congestion control algorithms that monitor network conditions based on feedback from the receiver and adapt the video output. READ MORE

  5. 5. Systematic Literature Review of the Adversarial Attacks on AI in Cyber-Physical Systems

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Nail Valeev; [2022]
    Keywords : Adversarial attacks; machine learning; artificial intelligence; cyber-physical system; internet of things;

    Abstract : Cyber-physical systems, built from the integration of cyber and physical components, are being used in multiple domains ranging from manufacturing and healthcare to traffic con- trol and safety. Ensuring the security of cyber-physical systems is crucial because they provide the foundation of the critical infrastructure, and security incidents can result in catastrophic failures. READ MORE