Essays about: "master thesis in network security"

Showing result 1 - 5 of 48 essays containing the words master thesis in network security.

  1. 1. Model Based Testing for Programmable Data Planes

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gustav Rixon; [2023]
    Keywords : Model Based Testing; Programmable Data Planes; P4; Software- Defined Networking;

    Abstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE

  2. 2. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Swaroop Divya Sai Prem Nambala; Dexin Kong; [2023]
    Keywords : Reconfigurable intelligent surface; RIS; optimization; Ray-tracing; Mixed integer linear programming MILP ; Complex impulse response; Wireless Insite.; Technology and Engineering;

    Abstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE

  3. 3. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  4. 4. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE

  5. 5. Self-Play Reinforcement Learning for Finding Intrusion Prevention Strategies

    University essay from KTH/Matematisk statistik

    Author : Jakob Stymne; [2022]
    Keywords : Network security; automation; reinforcement learning; Markov Security Games; Neural Fictitious Self Play; Nätverkssäkerhet; automatisering; förstärkningsinlärning; Markovianska säkerhetsspel; Neural Fictitious Self Play;

    Abstract : This Master thesis studies automated intrusion prevention using self-play reinforcement learning. We extend a decision-theoretic model of the intrusion prevention use case based on optimal stopping theory proposed in previous work to a game-theoretic setting. READ MORE