Essays about: "Open Source Network Monitoring Systems"
Showing result 1 - 5 of 13 essays containing the words Open Source Network Monitoring Systems.
-
1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
2. A DSO-driven evaluation of a CIM profile : Development of a CIM profile based on use cases related to monitoring Vattenfalls low voltage network
University essay from Uppsala universitet/Institutionen för elektroteknikAbstract : The transition to more renewable energy sources places high demands on the power systems to be more flexible, and makes it grow in complexity. This has led to a growing need of a common format or language for data exchange in power systems because of the growing number of interconnected networks operated by different companies and utilities that need to communicate on a daily basis. READ MORE
-
3. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE
-
4. Anomaly Detection in Computer Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In this degree project, we study the anomaly detection problem in log files of computer networks. In particular, we try to find an efficient way to detect anomalies in our data, which consist of different logging messages from different systems in CERN’s network for the LHC-b experiment. READ MORE
-
5. Digital Twin-based Intrusion Detection for Industrial Control Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Digital twins for industrial control systems have gained significant interest over recent years. This attention is mainly because of the advanced capabilities offered by digital twins in the areas of simulation, optimization, and predictive maintenance. READ MORE