Essays about: "Network Security"

Showing result 1 - 5 of 567 essays containing the words Network Security.

  1. 1. Deep Learning and the Heston Model:Calibration & Hedging

    University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistik

    Author : Oliver Klingberg Malmer; Victor Tisell; [2020-07-03]
    Keywords : deep learning; deep hedging; deep calibration; option pricing; stochastic volatilty; Heston model; S P 500 index options; incomplete markets; transaction costs;

    Abstract : The computational speedup of computers has been one of the de ning characteristicsof the 21st century. This has enabled very complex numerical methods for solving existingproblems. As a result, one area that has seen an extraordinary rise in popularity over the lastdecade is what is called deep learning. READ MORE

  2. 2. Erlang as an alternative to a non-functional language for communication in a faulttolerant IoT sensor network

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Jimmy Holdö; [2020-02-17]
    Keywords : Internet of Things; Wireless Sensor Network; Erlang; IEEE 802.15.4; ZigBee; Network topology;

    Abstract : This thesis compares a C++ prototype and an Erlang prototype for an Internet ofThings application. Internet of Things applications are difficult to program becausethey consist of a distributed environment of heterogeneous devices, where each devicecan have limited resources and connectivity technologies. READ MORE

  3. 3. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  4. 4. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  5. 5. Identifying Challenges in Cybersecurity Data Visualization Dashboards

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Patrick Shirazi; [2020]
    Keywords : Cybersecurity visualization; Security visualization; security dashboards; Delphi technique;

    Abstract : Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. READ MORE