Essays about: "control and security system"

Showing result 6 - 10 of 319 essays containing the words control and security system.

  1. 6. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 7. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE

  3. 8. Dasty : Revealing Real-World Prototype Pollution Consequences with Dynamic Taint Analysis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Moosbrugger; [2023]
    Keywords : Prototype Pollution Gadgets; Dynamic Taint Analysis; Forced Branch Execution; NodeProf Instrumentation; Truffle GraalJS;

    Abstract : Prototype pollution is a vulnerability in JavaScript and other prototype-based languages that allows malicious actors to inject a property into an object’s prototype. The injected property can subsequently trigger gadgets - source code sections that use the properties in sensitive locations. READ MORE

  4. 9. Evaluation of novel climate-friendly feed for Nile tilapia in Tanzania

    University essay from SLU/Dept. of Animal Nutrition and Management

    Author : Vilma Johansson; [2023]
    Keywords : Black soldier fly; novel fish feed; circular aquaculture; sub-Sahara aquaculture; greenhouse gas emissions; LCA; Nile tilapia;

    Abstract : Tanzania is a country located in sub-Sahara Africa by the Indian Ocean. Tanzania's aquaculture sector is small but has the potential to grow. As the population grows, so does the demand for food. Nile tilapia is the most cultured fish in Tanzania due to its hardiness, fast growth and tolerance to many environmental conditions. READ MORE

  5. 10. Model Based Testing for Programmable Data Planes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gustav Rixon; [2023]
    Keywords : Model Based Testing; Programmable Data Planes; P4; Software- Defined Networking;

    Abstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE