Advanced search
Showing result 6 - 10 of 22 essays matching the above criteria.
-
6. Security Threats and Countermeasures for Connected Vehicles
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE
-
7. A Framework for Using Deep Learning to Detect Software Vulnerabilities
University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska fakultetenAbstract : In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, making the software security of enterprises or individuals seriously threatened. Although it is difficult to avoid the occurrence of software vulnerabilities in the process of software development, it is also a way to find and modify the vulnerabilities as early as possible. READ MORE
-
8. A Privacy-preserving Pseudonym Acquisition Scheme for Vehicular Communication Systems
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : Vehicular communication systems rely on temporary anonymous identities, i.e. pseudonyms, in order to establish security and at the same time avoid the possibility of tracking vehicles. If a vehicle uses only one pseudonym, an adversary would be able to follow the vehicle by observing and linking messages, signed under that pseudonym. READ MORE
-
9. Optimization of Electromechanical Studies for the Connection of Hydro Generation
University essay from KTH/ElkraftteknikAbstract : The current model for electricity generation is based on power plants connected to the transmission network. This provides electricity to the distribution network and after that to the consumers. READ MORE
-
10. Anomaly detection in user behavior of websites using Hierarchical Temporal Memories : Using Machine Learning to detect unusual behavior from users of a web service to quickly detect possible security hazards.
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal anomaly detection. It is here applied to the problem of anomaly detec-tion in user behavior of web services, which is getting moreand more important in a network security context. READ MORE