Essays about: "Traffic Security"

Showing result 6 - 10 of 203 essays containing the words Traffic Security.

  1. 6. Impact of C-ITS on Mobility and Society

    University essay from KTH/Transportplanering

    Author : Ninnie Tägtström; [2023]
    Keywords : C-ITS; ITS; Mobility; Digitization; Automation; Transportation System; Traffic Signals; Vensim;

    Abstract : This thesis investigates the important potential of Cooperative Intelligent Transport Systems (C-ITS) onmobility and society. C-ITS appears as a promising solution to reinvent transportation and become avital part of the ever-evolving environment as developments in technology continue to change the world. READ MORE

  2. 7. Observability in Machine Learning based Intrusion Detection Systems for RPL-based IoT

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Malin Strand; [2023]
    Keywords : ;

    Abstract : As IoT devices become more and more present in our daily lives, security in IoT networks has become a major concern. A promising approach for detecting attacks is the use of machine learning based Intrusion Detection Systems (IDSs). The attack studied in this thesis is the blackhole attack, an attack causing parts of the network to disconnect. READ MORE

  3. 8. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE

  4. 9. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  5. 10. W2R: an ensemble Anomaly detection model inspired by language models for web application firewalls security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Zelong Wang; Athira AnilKumar; [2023]
    Keywords : web application firewall; anomaly detection; word2vec; BERT; dimension reduction; ensemble model;

    Abstract : Nowadays, web application attacks have increased tremendously due to the large number of users and applications. Thus, industries are paying more attention to using Web application Firewalls and improving their security which acts as a shield between the app and the internet by filtering and monitoring the HTTP traffic. READ MORE