Essays about: "kth security"
Showing result 1 - 5 of 932 essays containing the words kth security.
-
1. The Internet of Things: Addressing the risks of smart homes : An analysis of Internet of Things-based smart homes from a security standpoint
University essay from KTH/Hälsoinformatik och logistikAbstract : The security aspects of the Internet of Things (IoT) have become increasingly important as the number of connected devices continues to grow. This study presents a thorough analysis of the IoT security issues that exist, with an emphasis on smarthome devices. READ MORE
-
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
3. Optimizing Cyber Security Gap Analysis for Legacy Railway Control Systems : A Proposed New Gap Analysis Process using CIS Benchmarks™
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The global concern over cyber security threats to railway control systems is growing due to the factual and potential threats that could lead to severe consequences, including disruption, derailment, and collision. Legacy railway control systems, which were not originally designed with cyber security in mind, are particularly vulnerable to common cyber attacks. READ MORE
-
4. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE
-
5. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE