Essays about: "Network security"
Showing result 11 - 15 of 808 essays containing the words Network security.
-
11. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE
-
12. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
13. Enhancing human-robot interaction using mixed reality
University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskapAbstract : Industry 4.0 is a new phase of industrial growth that has been ushered in by the quick development of digital technologies like the Internet of Things (IoT), artificial intelligence (AI), and robots. Collaborative robotic products have appeared in this changing environment, enabling robots to collaborate with people in open workspaces. READ MORE
-
14. Therapeutic orientation bias & personal values: A study on Swedish psychologists
University essay from Umeå universitet/Institutionen för psykologiAbstract : Psychodynamic therapy (PDT) and Cognitive behavioral therapy (CBT) are the main Therapeutic Orientations (TO) in Sweden and this study aims to explore the relationship between psychologists personal value preferences and their inclination toward PDT/CBT. Furthermore, the study explored if there is a tendency to explicitly appreciate one TO and depreciate the other (explicit bias) and additionally, if that tendency is associated with personal value preferences. READ MORE
-
15. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE