Essays about: "edge security"
Showing result 1 - 5 of 44 essays containing the words edge security.
-
1. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE
-
2. An evaluation of edge deployment models for Kubernetes
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : With organisations moving away from in-house servers but still requiring love latency, high security and stability, edge nodes make their appearance as the best alternative. However, it is unclear which deploymen tmethod to use on those systems. This study explored the benefits and disadvantages of the multi-cluster and remote worker approach. READ MORE
-
3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
4. Efficient Memory Encryption for Neural Network Accelerators
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE
-
5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE