Essays about: "network protection"

Showing result 21 - 25 of 199 essays containing the words network protection.

  1. 21. Fire Risk and Hazard Analysis of Lithium-Ion Battery Technologies in Underground Facilities: A Literature Review

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Sean Meehan; [2022]
    Keywords : lithium-ion battery; hazards; risks; thermal runaway; detection; fire protection; Technology and Engineering;

    Abstract : The past decades have seen an exponential growth of the lithium-ion battery (LIB) market as use of this high-energy storage has found applications in nearly every industry. The European Organization for Nuclear Research (CERN) is interested in implementing this technology within their underground network and this literature review is intended to assist with addressing fire and safety concerns. READ MORE

  2. 22. Geospatial Timeseries Imputation using Deep Neural Networks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Mattis Kienmayer; [2022]
    Keywords : ;

    Abstract : With the advancement of technology, data collection has become a big part of many industries.Large amounts of data can be used for analytics purposes, and give companies the opportunityto offer a wider range of services to their customers. READ MORE

  3. 23. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE

  4. 24. The E-krona and Traceability of Your Payment Data : An analysis of the fundamental differences and privacy-related impacts of the Riksbank’s e-krona pilot in comparison with card-based transactions

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Lovisa Stenbacka; [2022]
    Keywords : e-krona; traceability; payment data; data protection; law; financial secrecy; AML; rule of law; democracy; technology; legal informatics; legal policy; law and technology; constitutional provisions; DLT; blockchain; wallet-id; information security; fintech; financial technology; the Riksbank; central bank; money; Riksbanken; finansiell teknologi; e-kronan; digital centralbanksvaluta; statlig kontroll; centralbank; konstitutionella förpliktelser; demokrati; skydd för betaldata; skydd för personuppgifter; finansiell sekretess; banksekretess; penningtvätt; informationsteknologi; rättsinformatik; rättspolitik;

    Abstract : The Riksbank is currently investigating the possibility of producing a Central Bank Digital Currency in Sweden, called “e-krona”, implemented through an “e-krona network” on a platform based on Distributed Ledger Technology. By applying the methodology of legal dogmatics, legal informatics, and a legal policy perspective, this thesis examines and analyses some of the fundamental differences in Sweden’s current payment system for transactions at the point of sale, comparing debit card-based transactions with payments using the model of the Riksbank’s e-krona pilot. READ MORE

  5. 25. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guangze Shi; [2022]
    Keywords : Federated learning; Gradient share; Deep neural network; Information leak; Privacy and security; Maskininlärning med flera noder; Gradientdelning; Djupt neuralt nätverk; Informationsläcka; Integritetssäkerhet;

    Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE