Essays about: "Security Standards"

Showing result 1 - 5 of 200 essays containing the words Security Standards.

  1. 1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  2. 2. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  3. 3. Smart Contract Maturity Model

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Jordy Jordanus Cornelius van Raalte; [2023]
    Keywords : smart contracts; maturity models; smart contract problems; blockchain; proof of work; proof of stake; smart contract implementation problems; smart contract use cases; smart contract challenges; smart contract opportunities; bitcoin; Ethereum; Hyperledger fabric; Codra; Ethereum smart contracts; smart contract platforms; maturity models and CMMI maturity model;

    Abstract : A smart contract is a recently emerging technology which enables agreement to be automatable by computers and enforceable by legal enforcement or tamper-proof execution of code. A majority of smart contracts are run on the blockchain which enables smart contract transactions without a central authority. READ MORE

  4. 4. Effects of Energy Performance Improving Measures on a 1990's Brick House in Southern Czech Republic : Computer Simulations using IDA-ICE

    University essay from Högskolan i Gävle/Energisystem och byggnadsteknik

    Author : Vaclav Panek; [2023]
    Keywords : Final energy demand; Primary energy demand; Energy performance; Refurbishment; Single-family house; Space heating;

    Abstract : The residential sector was responsible for 25% of the Final Energy Demand (FED) in the European Union in 2015. Countries in Central and Eastern Europe such as the Czech Republic are particularly concerned with ensuring security of supply at the lowest possible cost in recent years. READ MORE

  5. 5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE