Essays about: "TLS"

Showing result 6 - 10 of 88 essays containing the word TLS.

  1. 6. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  2. 7. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  3. 8. A Study of Direction of Arrival Methods Based on Antenna Arrays in Presence of Model Errors.

    University essay from Uppsala universitet/Signaler och system

    Author : Julia Sjödin; [2022]
    Keywords : Direction of Arrival; DOA; WSF; MUSIC; TLS-ESPRIT; Extended Kalman filter; model error;

    Abstract : Methods for Direction of Arrival, DOA estimation of multiple objects based on phased arrayantenna technology have many advantages in for example electronic warfare and radarapplications. However, perfect calibration of an antenna array can seldom be achieved. READ MORE

  4. 9. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Rajala; Kevin Scott; [2022]
    Keywords : Passive OS Fingerprinting; Encrypted Traffic Identification; Automated Traffic Analysis; Machine Learning; Supervised Learning; Networks; Packet Classification; Security and Privacy;

    Abstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE

  5. 10. Cloud-based video stabilization processing in real-time

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Brecht Callens; [2022]
    Keywords : ;

    Abstract : On-device real-time video stabilization has become a common feature of modernsmartphones. This processing technique improves quality but is an expensive processthat requires significant resources from the devices themselves. By offloading thisprocess to the cloud, much better hardware could be utilized to perform these tasks. READ MORE