Advanced search

Showing result 6 - 10 of 22 essays matching the above criteria.

  1. 6. Security Threats and Countermeasures for Connected Vehicles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuwei Gong; [2019]
    Keywords : Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd;

    Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE

  2. 7. A Framework for Using Deep Learning to Detect Software Vulnerabilities

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakulteten

    Author : Yi Hu; [2019]
    Keywords : Software Vulnerability; Vulnerability Detection; Deep Learning; Neural Network;

    Abstract : In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, making the software security of enterprises or individuals seriously threatened. Although it is difficult to avoid the occurrence of software vulnerabilities in the process of software development, it is also a way to find and modify the vulnerabilities as early as possible. READ MORE

  3. 8. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Andreas Messing; [2018]
    Keywords : vehicular communication; network; security; privacy;

    Abstract : Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. READ MORE

  4. 9. Optimization of Electromechanical Studies for the Connection of Hydro Generation

    University essay from KTH/Elkraftteknik

    Author : Mathieu GROULT; [2018]
    Keywords : Active power response time; EUROSTAG; Hydraulic power plant; Grid codes; MATLAB; Nuclear power plant; Rotor angle stability; aktiv effekt tidrespons; EUROSTAG; hydraulisk kraftverk; nätkoder; MATLAB; kärnkraftverk; rotorn vinkelstabilitet;

    Abstract : The current model for electricity generation is based on power plants connected to the transmission network. This provides electricity to the distribution network and after that to the consumers. READ MORE

  5. 10. Anomaly detection in user behavior of websites using Hierarchical Temporal Memories : Using Machine Learning to detect unusual behavior from users of a web service to quickly detect possible security hazards.

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Victor Berger; [2017]
    Keywords : anomaly detection; machine learning; HTM;

    Abstract : This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal anomaly detection. It is here applied to the problem of anomaly detec-tion in user behavior of web services, which is getting moreand more important in a network security context. READ MORE