Essays about: "Security effectiveness"

Showing result 1 - 5 of 175 essays containing the words Security effectiveness.

  1. 1. Unraveling Paradoxical Tensions in Digital Servitization Ecosystems : A case study in the mining industry

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Johannes Åström; Jakob Karlelid; [2024]
    Keywords : Digital servitization; Ecosystem; Paradoxes; Tensions; Digital tjänstefiering; Ekosystem; Paradoxer; Spänningar;

    Abstract : Purpose - This study aims to understand what paradoxical tensions arise within an ecosystem when companies collectively pursue digital servitization and how these tensions impact value co-creation. Method -  The study is an explorative single-case study based on the mining industry in Sweden and involves respondents from industry-leading organizations. READ MORE

  2. 2. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  3. 3. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  4. 4. Mutual Enhancement of Environment Recognition and Semantic Segmentation in Indoor Environment

    University essay from

    Author : Venkata Vamsi Challa; [2024]
    Keywords : Semantic Segmentation; Scene Classification; Environment Recognition; Machine Learning; Deep Learning; Image Classification; Vision Transformers; SAM Segment Anything Model ; Image Segmentation; Contour-aware semantic segmentation;

    Abstract : Background:The dynamic field of computer vision and artificial intelligence has continually evolved, pushing the boundaries in areas like semantic segmentation andenvironmental recognition, pivotal for indoor scene analysis. This research investigates the integration of these two technologies, examining their synergy and implicayions for enhancing indoor scene understanding. READ MORE

  5. 5. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE