Essays about: "Internet säkerhet"
Showing result 1 - 5 of 124 essays containing the words Internet säkerhet.
-
1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint
University essay from KTH/Hälsoinformatik och logistikAbstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE
-
2. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE
-
3. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE
-
4. Evaluating the Viability of Synthetic Pre-training Data for Face Recognition Using a CNN-Based Multiclass Classifier
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today, face recognition is becoming increasingly accurate and faster with deep learning methods such as convolutional neural networks (CNNs), and is now widely used in areas such as security and entertainment. Typically, these CNNs are trained using real-face datasets like CASIA-WebFace, which was put together using web-crawling of IMDB. READ MORE
-
5. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE