Essays about: "network Security Standards"

Showing result 1 - 5 of 40 essays containing the words network Security Standards.

  1. 1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  2. 2. Exploring information security culture within Swedish municipalities : A qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Haydar Ameri; [2023]
    Keywords : Municipality; security awareness; security culture; information security; cybersecurity;

    Abstract : The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. READ MORE

  3. 3. Study Of Universal Islanding Detection Techniques In Distributed Generation Systems

    University essay from Linnéuniversitetet/Institutionen för fysik och elektroteknik (IFE)

    Author : Ochai Ochalla Danladi; [2023]
    Keywords : Distributed Generation; Islanding; Quality Factor; Resonance Frequency; Low Voltage; Medium Voltage; Electronic Power Converter; Inverter;

    Abstract : Energy security, global warming, and climate change have been a major source of global discussions and development. Likewise, the rising cost of electricity for consumers and exponential demand for energy are major factors driving the incremental growth and integration of sustainable forms of energy generation into power the system cycle. READ MORE

  4. 4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 5. Security Analysis of OPC UA in Automation Systems for IIoT

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Vaishnavi Varadarajan; [2022]
    Keywords : Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ; Open Platform Communication Unified Architecture OPC UA ; Man in the Middle Attack; Denial of Service DoS ; Industrial Internet of Things IIoT ; Time Sensitive Networking TSN ;

    Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE