Essays about: "network security management thesis"

Showing result 11 - 15 of 70 essays containing the words network security management thesis.

  1. 11. Service Management for P2P Energy Sharing Using Blockchain – Functional Architecture

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Mohammad Hossein Abdsharifi; Ripan Kumar Dhar; [2022]
    Keywords : Distributed Systems; Blockchains; Energy Management; Service Management; Energy Trading; Energy Sharing; Hyperledger Fabric;

    Abstract : Blockchain has become the most revolutionary technology in the 21st century. In recent years, one of the concerns of world energy isn't just sustainability yet, in addition, being secure and reliable also. READ MORE

  2. 12. Investigation of an automatic deployment transformation method for OpenStack

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sai Vivek Gudipati; Vishwa Mithra Tatta; [2022]
    Keywords : Openstack; Deployment tools; Life-Cycle Management Tools; Migration; Backup and recovery;

    Abstract : Cloud computing is the on-demand availability of computer resources provided as a service over a network. OpenStack is an open-source cloud computing software. Deploying and operating OpenStack manually is a tedious process. To address this,life-cycle management tools have been developed. READ MORE

  3. 13. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  4. 14. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zannatun Nayem Tania; [2021]
    Keywords : Data Privacy; Resource Management; Machine Learning; Fitbit; Internet of Things IoT ; Optimization; Dataintegritet; Resurshantering; Machine Learning; Fitbit; Internet of Things IoT ; Optimering;

    Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE

  5. 15. A comparison of rail and sea freight from Europe to Asia

    University essay from Lunds universitet/Teknisk logistik

    Author : Jackie Berg; Louise Pettersson; [2021]
    Keywords : Sea freight; Rail freight; Transportation mode selection; Asia; Transportation; Technology and Engineering;

    Abstract : Title: A comparison of rail and sea freight from Europe to Asia Authors: Jackie Berg & Louise Pettersson Supervisors: Jan Olhager, Department of Industrial Management and Logistics, Faculty of Engineering, Lund University Malin Gejde, Shipping Manager, Tetra Pak AB Background: Transportation mode selection has become a more strategic part of a well-functioning supply chain as globalization, environmental concerns, and security requirements have become more important. Currently, sea freight is the most used transportation mode for Tetra Pak when transporting goods between Europe and Asia. READ MORE