Essays about: "Secure monitoring"

Showing result 1 - 5 of 55 essays containing the words Secure monitoring.

  1. 1. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  2. 2. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  3. 3. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maryum Hamid; [2023]
    Keywords : HashiCorp Vault; Key Management System; Kubernetes; HashiCorp Vault; Key Management System; Kubernetes;

    Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE

  4. 4. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  5. 5. Substation digitalization and fault isolation : A study of the influence of degree of digitalization to regulatory indicators in the power grid

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Ili Atalla; [2023]
    Keywords : ;

    Abstract : With changes in the energy sector, more demand is set on the power grid as electricity consumption is seen to increase and more decentralized renewable energy production is connecting to the grid. Svenska Kraftnät, electric system transmission operator in Sweden, describes the importance a more secure operation of the power system. READ MORE