Essays about: "endpoint security"

Showing result 1 - 5 of 8 essays containing the words endpoint security.

  1. 1. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  2. 2. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Yousef Hashem; Elmedin Zildzic; [2022]
    Keywords : intrusion detection; wazuh; security; edr; intrusion response;

    Abstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE

  3. 3. Implementation of a component to manage authorization for a web application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Victor Kai Oscar Paulsen; [2021]
    Keywords : SSO; Auth; Spring Boot; Okta; Web Application; Security; OAuth2.0; OIDC; Authorization code flow; API.; Technology and Engineering;

    Abstract : Examensarbetet utfördes i samarbete med Klarna i Giessen med syftet att utveckla en komponent i en del av en webbapplikation som hanterar autentisering. Komponenten skulle interagera med auktoriseringstjänsten försedd från Okta tillsammans med korrekt auktoriseringsflöde som en lösning för tillåten användning av webbapplikationen. READ MORE

  4. 4. Implementation of a Deep Learning Inference Accelerator on the FPGA.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Shenbagaraman Ramakrishnan; [2020]
    Keywords : Artificial Intelligence; Machine Learning; Deep Learning; Neural Networks; Deep Learning Accelerators; NVDLA; FPGA; Technology and Engineering;

    Abstract : Today, Artificial Intelligence is one of the most important technologies, ubiquitous in our daily lives. Deep Neural Networks (DNN's) have come up as state of art for various machine intelligence applications such as object detection, image classification, face recognition and performs myriad of activities with exceptional prediction accuracy. READ MORE

  5. 5. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE