Essays about: "TLS"

Showing result 11 - 15 of 88 essays containing the word TLS.

  1. 11. Simulation of road traffic flow in Hangzhou

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Louise Brandt; Anders Holmberg; [2022]
    Keywords : simulation; road traffic flow; traffic flow; traffic; sumo; netedit; dlr.de; zju; hangzhou; zhejiang; china; queue; queuing system; control; automatic control; tls; tli; phase time; cycle time; traffic light signal; traffic light intersection; pedestrian crossing; idling time; optimize traffic flow; traffic jam; un global goal; mfs; minor field study; sida; reduce emissions; emission; vehicle; pcu; matlab; python; xml; json; algorithm; variance; deviation; comparison; ratio; case; evacuation; scenario; green; detector; taz; traffic assignment zone; environment; carbon dioxide; randomtrips; flow; fringe; mingap; speeddev; departspeed; sigma; lanechangemodel; sl2015; commuter; public transport; busstop; osm; openstreetmap; sumocfg; traci; driving pattern; road lane; street lane; lane change; u-turn; intersection; junction; teleportation; teleport; route; depart; arrive; collision; street occupancy; occupancy; Technology and Engineering;

    Abstract : Is it possible to increase traffic flows and decrease stand stills in rush hour traffic by tweaking existing traffic light signals? A vehicle’s engine running on idle is not useful in physical terms and emits unnecessary exhausts. By investigating and observing signal phase times on site in Hangzhou, China, an effort was made to find out if it was possible to get better flow and thus lower emissions by changing the traffic signal programs. READ MORE

  2. 12. The Everyday Internet, a Minefield in Disguise : Characterization of different types of domains including malicious and popularity

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Linn Petersson; Rebecka Lindkvist; [2022]
    Keywords : characterisation; malicious; domains; vulnerabilities; cipher suites; TLS; protocols; security; certificates;

    Abstract : Today, security has become a growing concern for all internet users, where technology is developing faster than its security is implemented, which leads to insecure domains. In this thesis, we look at the reality of today’s domains and research if some categories of domains are safer than others and the reason behind it. READ MORE

  3. 13. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  4. 14. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zhe Wang; [2021]
    Keywords : Intra-server load balancing; QUIC protocol; Connection migration; BPF; Connection management; Lastbalansering mellan servern; QUIC protokoll; Anslutningsmigrering; BPF; Anslutningshantering;

    Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE

  5. 15. Collecting and analyzing Tor exit node traffic

    University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Torbjörn Jonsson; Gustaf Edeby; [2021]
    Keywords : Deep packet inspection; Traffic analysis; Tor network; The Onion router;

    Abstract : Background. With increased Internet usage occurring across the world journalists, dissidents and criminals have moved their operations online, and in turn, governments and law enforcement have increased their surveillance of their country’s networks. READ MORE