Essays about: "comprehensive security"

Showing result 1 - 5 of 184 essays containing the words comprehensive security.

  1. 1. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  2. 2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  3. 3. Supplementing Dependabot’svulnerability scanning : A Custom Pipeline for Tracing DependencyUsage in JavaScript Projects

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isak Karlsson; David Ljungberg; [2024]
    Keywords : Vulnerability scanning; Software Dependencies; JavaScript; TypeScript; Dependabot; Vulnerability Scanning Tools; Software Security; Pipeline; GitHub; Dependency Management;

    Abstract : Software systems are becoming increasingly complex, with developers frequentlyutilizing numerous dependencies. In this landscape, accurate tracking and understanding of dependencies within JavaScript and TypeScript codebases are vital formaintaining software security and quality. READ MORE

  4. 4. Policing Möllevången - A critical discourse analysis of policing in the neoliberal city

    University essay from Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografi

    Author : Carolina Pettersson; [2024]
    Keywords : Critical realism; Critical discourse analysis; Malmö; Policing; Urban neoliberalization; Social Sciences;

    Abstract : This thesis addresses the ideological conditions for policing in Malmö, Sweden. It takes its theoretical point of departure in the rise of urban neoliberalism, and how urban neoliberalization alters policy and practices of policing. READ MORE

  5. 5. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE