Essays about: "network protection"
Showing result 21 - 25 of 199 essays containing the words network protection.
-
21. Fire Risk and Hazard Analysis of Lithium-Ion Battery Technologies in Underground Facilities: A Literature Review
University essay from Lunds universitet/Avdelningen för BrandteknikAbstract : The past decades have seen an exponential growth of the lithium-ion battery (LIB) market as use of this high-energy storage has found applications in nearly every industry. The European Organization for Nuclear Research (CERN) is interested in implementing this technology within their underground network and this literature review is intended to assist with addressing fire and safety concerns. READ MORE
-
22. Geospatial Timeseries Imputation using Deep Neural Networks
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : With the advancement of technology, data collection has become a big part of many industries.Large amounts of data can be used for analytics purposes, and give companies the opportunityto offer a wider range of services to their customers. READ MORE
-
23. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE
-
24. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions
University essay from Uppsala universitet/Juridiska institutionenAbstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE
-
25. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE