Essays about: "intrusion response"
Showing result 16 - 19 of 19 essays containing the words intrusion response.
-
16. Performance study of security mechanism for mobile agent domain
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : Context: Mobile agents are considered quite challenging and provide scope for developing innovative applications in distributed computing domain. One important area where there is a scope to employ mobile agents successfully is the Network security domain. There are plethora of mobile agent based security mechanisms proposed till now. READ MORE
-
17. Salt is killing us: Salinity and livelihood in a Bangladesh village
University essay from Lunds universitet/Master of Science in Development Studies; Lunds universitet/Graduate School; Lunds universitet/SocialantropologiAbstract : This thesis is the result of a minor field work in a coastal Bangladesh village where peoples are struggling to adapt with salt water intrusion. It describes how people in one community under climatic change or variability adapt to an acute problem, and how their perceptions of that environment, their Ethnoecology influence this response. READ MORE
-
18. Finite Element based Parametric Studies of a Truck Cab subjected to the Swedish Pendulum Test
University essay from Institutionen för ekonomisk och industriell utvecklingAbstract : Scania has a policy to attain a high crashworthiness standard and their trucks have to conform to Swedish cab safety standards. The main objective of this thesis is to clarify which parameter variations, present during the second part of the Swedish cab crashworthiness test on a Scania R-series cab, that have significance on the intrusion response. READ MORE
-
19. Building Secure Systems using Mobile Agents
University essay from KTH/Data- och systemvetenskap, DSVAbstract : The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. READ MORE