Essays about: "Traffic Security"
Showing result 11 - 15 of 203 essays containing the words Traffic Security.
-
11. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
12. Anomaly detection in surveillance camera data
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE
-
13. Characterization and Stabilization of Transverse Spatial Modes of Light in Few-Mode Optical Fibers
University essay from Linköpings universitet/InformationskodningAbstract : With the growing need for secure and high-capacity communications, innovative solutions are needed to meet the demands of tomorrow. One such innovation is to make use of the still unutilized spatial dimension of light in communications, which has promising applications in both enabling higher data traffic as well as the security protocols of the future in quantum communications. READ MORE
-
14. Virtual Reality over the Internet : An experimental study of common countermeasures when using VR applications over the Internet
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Currently, there is a lack of research behind the security of Virtual Reality against fingerprinting attacks and how these affect the Quality of Experience (QoE) and Quality of Service (QoS) for a user. With practical testing in a game which implements traffic shaping methods as security defences, this thesis aims to take the first step towards changing this. READ MORE
-
15. Secure satellite internet usage in high-risk areas
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE