Essays about: "Security Countermeasure"
Showing result 1 - 5 of 16 essays containing the words Security Countermeasure.
-
1. Studies on future Mine Countermeasure Vessels (MCMV)
University essay from Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskapAbstract : Background Maritime transportation is vital for international trade, and any disruption to this flow can have severe financial and environmental consequences. Ship mines, both old and new, present significant risks as man-made obstacles. READ MORE
-
2. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
3. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE
-
4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
5. STRUCTURE OF SECURITY REQUIREMENTS:INSIGHTS FROM REQUIREMENTS ELICITATION
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : As IT-systems become more complex they become more susceptible to suffering of security threats and vulnerabilities. Accordingly, security has also become an increasingly growing concern that must be considered before the system has already been designed and put into operation. READ MORE