Essays about: "iP"

Showing result 21 - 25 of 697 essays containing the word iP.

  1. 21. EU Copyright and Trade Mark Law: a unifying lens for the protection of Fashion Designs? : Analysis and research into a better understanding of the concepts of originality and distinctiveness

    University essay from Stockholms universitet/Juridiska institutionen

    Author : Laureen Schuldt; [2023]
    Keywords : ;

    Abstract : As one of the largest and most important sectors, the fashion industry holds a significant position in the global economy. Consequently, ensuring legal protection for fashion designs is of utmost importance to designers and fashion brands alike. As sui generis regime, EU design rights are tailored to the protection of fashion. READ MORE

  2. 22. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  3. 23. Power Estimation Tool for Digital Front-End 5G Radio ASIC

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rajnandini Bhutada; [2023]
    Keywords : 5G; ASIC; DFE; Carrier Aggregation; Digital Pre-Distortion; Downlink; Uplink; Power Consumption; Power Model; Yield Analysis.;

    Abstract : Application Specific Integrated Circuits (ASICs) are critical to delivering on 5G’s promises of high speed, low latency, and expanded capacity. Digital Front-End (DFE) ASICs are particularly important components because they enhance crucial signal processing activities. READ MORE

  4. 24. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE

  5. 25. Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Thomas Manayathil Chackochan; Ronit Gonsalvez; [2023]
    Keywords : cloud computing; regulatory frameworks; IP telephony; forensic investigation; compliance regulations;

    Abstract : Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. READ MORE