Essays about: "Security information"

Showing result 21 - 25 of 813 essays containing the words Security information.

  1. 21. A Study of Vulnerabilities and Weaknesses in Connected Cars

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Koray Kaya; [2019]
    Keywords : ;

    Abstract : Security vulnerabilities in connected cars can have devastating consequences. For this reason we compiled and analyzed vulnerabilities in connected cars using empirical data to gain an understanding of the security issues in the automobile industry. The data is gathered from the U.S. READ MORE

  2. 22. Cross Continental Access of Information and the Boarder Gateway Protocol

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Johan Frisk; [2019]
    Keywords : BGP; Boarder gateway protocol;

    Abstract : The usage of technical equipment and the interconnection of all these devices has become essential to our every day life and to provide as good service as possible for the internet of today. However, many have the opportunity to inspect the data as it is being rushed across the globe to provide users with information at the press of a button. READ MORE

  3. 23. Tiny Security : Evaluating energy   use for security in an IoT application

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Mårten Söderquist; [2019]
    Keywords : Security; constrained device; AES; IoT; sensors; AEAD; ATmega1284P; ACORN128;

    Abstract : IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. READ MORE

  4. 24. Barriers to adopting mobile access solutions in hospitality organizations.

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : OLLI PIETILÄ; [2019]
    Keywords : ;

    Abstract : This study aims to investigate factors that affect the attitudes towards mobile access control solutions among decision-making units (DMUs) in hospitality organizations in Finland to identify perceived benefits and barriers to adoption of mobile solutions. The first mobile access control solution was introduced in the early 2000s and is used successfully in, for example, public transport and in offices. READ MORE

  5. 25. Towards Machine Learning Enabled Automatic Design of IT-Network Architectures

    University essay from KTH/Matematisk statistik

    Author : Lova Wåhlin; [2019]
    Keywords : IT-Architecture graph; Node Embedding; Graph Embedding; Reinforcement Learning; Machine Learning; IT-Arkitektur; Node Embedding; Graph Embedding; Reinforcement learning; Maskininlärning;

    Abstract : There are many machine learning techniques that cannot be performed on graph-data. Techniques such as graph embedding, i.e mapping a graph to a vector, can open up a variety of machine learning solutions. READ MORE