Essays about: "internet architecture"
Showing result 1 - 5 of 289 essays containing the words internet architecture.
-
1. Third-party risks in industrial control systems: : A case study in the wind power sector
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE
-
2. Migrating a monolithic application to behaviour-driven function-based application : A study on architectural patterns and migration strategy forbuilding function-based applicationEn studie om arkitekturmönster och migreringsstrategi för attskapa funktionsbaserad applikation
University essay from KTH/Hälsoinformatik och logistikAbstract : With the increased use of the internet and applications, the architecture has had to adapt to the increasing number of users. Many companies have started migrating from monolithic architecture to microservice and, more recently, started to explore the possibility of migrating applications to Function-as-a-Service. READ MORE
-
3. Fault-Tolerant Over-the-Air Federated Learning with Clustered Aggregation : Using a hierarchical architecture with hybrid digital and analog communication, to deal with byzantine users in Federated Learning over wireless networks.
University essay from Linköpings universitet/KommunikationssystemAbstract : Rapid advancements in modern AI applications have placed unprecedented demands on large-scale connectivity and data aggregation. The vision of Internet-of-Things (IoT) is supported by a massive amount of distributed sensors and wireless devices that generate useful data for these applications. READ MORE
-
4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
5. Next Generation Access Control as a support core system in the Arrowhead Framework
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In the fourth industrial revolution known as Industry 4.0, massive amounts of data is collected, processed and communicated by cyber-physical systems and Internet of Things (IoT). Although the nature of this data varies, industrial data is often proprietary and may cause harm to the data owner in the event of a resource leak. READ MORE
