Essays about: "network security INFORMATION TECHNOLOGY"

Showing result 6 - 10 of 190 essays containing the words network security INFORMATION TECHNOLOGY.

  1. 6. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  2. 7. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 8. Challenges of Online Security for Senior Citizens

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sinthujan Sivagumaran; [2023]
    Keywords : senior citizens; elderly; cyber security; online security; challenges; remedies;

    Abstract : Senior citizens are among the most vulnerable groups of cyber victimization in today’s contexts. Ensuring online security for the elderly has become extremely critical as the global elderly population is on the rise and the incident of cyber victimization is rapidly growing causing financial and societal problems for them. READ MORE

  4. 9. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 10. Smart Alarm- On the performance characteristics of linear, multi-linear and non-linear tensor models for alarm prediction in multi-sensor data.

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Chandraprakash Sahu; Ahamed Buhari; [2022]
    Keywords : Machine Learning; Tensor Regression; Deep Learning; Multivariate Time Series;

    Abstract : Information and modern computing technology advancements have led to a rise in the importance of maintenance, particularly in areas where a single components failure could have a significant impact on the overall systems performance. Numerous industries, including Alfa Laval, are operating on conditional-based systems that provide warnings only when a machine fails. READ MORE