Essays about: "Network security"
Showing result 1 - 5 of 577 essays containing the words Network security.
-
1. Deep Learning and the Heston Model:Calibration & Hedging
University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistikAbstract : The computational speedup of computers has been one of the de ning characteristicsof the 21st century. This has enabled very complex numerical methods for solving existingproblems. As a result, one area that has seen an extraordinary rise in popularity over the lastdecade is what is called deep learning. READ MORE
-
2. Erlang as an alternative to a non-functional language for communication in a faulttolerant IoT sensor network
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : This thesis compares a C++ prototype and an Erlang prototype for an Internet ofThings application. Internet of Things applications are difficult to program becausethey consist of a distributed environment of heterogeneous devices, where each devicecan have limited resources and connectivity technologies. READ MORE
-
3. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE
-
4. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system
University essay from KTH/Medicinteknik och hälsosystemAbstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE
-
5. Identifying Challenges in Cybersecurity Data Visualization Dashboards
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. READ MORE
