Essays about: "System Integrity"

Showing result 1 - 5 of 262 essays containing the words System Integrity.

  1. 1. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  2. 2. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  3. 3. Probabilistic guarantees in model-checking with Time Petri Nets

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Manon Lecart; [2023]
    Keywords : Formal Methods; Statistical Model-Checking; Timed Automata; Timed PetriNets; Formella Metoder; Statistisk Modellkontroll; Timed Automater; Time Petri Nets;

    Abstract : With the prevalence of technology and computer systems in today’s society, it is crucial to ensure that the systems we use are secure. The fields that study these issues, cybersecurity and cybersafety, use the formal verification technique of modelchecking. READ MORE

  4. 4. Developing a High-Voltage Mechanical Disconnector: Meeting Safety Standards

    University essay from Lunds universitet/Innovation

    Author : Hampus Carlqvist; [2023]
    Keywords : Opticept; Standards; Product development; Disconnector; High Voltage; Technology and Engineering;

    Abstract : This master thesis is conducted in collaboration with Opticept Technologies, a company operating in the Pulsed Electric Field (PEF) treatment industry. PEF treatment necessitates the use of high-voltage machines, and this thesis focuses on exploring a mechanical disconnector that serves as an essential safety feature for such high-voltage systems. READ MORE

  5. 5. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE