Essays about: "nETWORK SECURITY"

Showing result 1 - 5 of 808 essays containing the words nETWORK SECURITY.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  3. 3. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  4. 4. Classifying femur fractures using federated learning

    University essay from Linköpings universitet/Statistik och maskininlärning

    Author : Hong Zhang; [2024]
    Keywords : Atypical femur fracture; Federated Learning; Neural Network; Classification;

    Abstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE

  5. 5. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy

    University essay from Göteborgs universitet/Graduate School

    Author : Elvira Tenggren; Isabella Asp; [2023-07-18]
    Keywords : SME; Sourcing; Manufacturing; Globalization; Regionalization; De-globalization; Reshoring; Network embeddedness; Efficiency-seeking; Security-seeking;

    Abstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE