Essays about: "next generation network security"

Showing result 1 - 5 of 16 essays containing the words next generation network security.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  2. 2. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  3. 3. Battery-less IoT Devices: Energy Source Manipulation Attacks

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Arslan Hameed; [2022]
    Keywords : ;

    Abstract : The Internet of Things (IoT) is expected to enable applications of utmost societal value, such as energy-efficient buildings, smart cities, and next-generation healthcare. While there has been a lot of progress on the security of larger devices, there is a need to consider the security of resource-constrained devices. READ MORE

  4. 4. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Vikhram Ravi; [2021]
    Keywords : 5g; ran; kubernetes; docker; tracing; observability; troubleshooting; service discovery; lttng;

    Abstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE

  5. 5. Multi-Tenancy Security in Cloud Computing : Edge Computing and Distributed Cloud

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ali Shokrollahi Yancheshmeh; [2019]
    Keywords : Cloud computing; OpenStack; Multi-Tenancy; Security; Multi-Tenancy Isolation.; Cloud computing; OpenStack; Multi-Tenancy; Security; Multi-Tenancy Isolation.;

    Abstract : With the advent of technology cloud computing has become the next generation of network computing where cloud computing can deliver both software and hardware as on-demand services over the Internet. Cloud computing has enabled small organizations to build web and mobile apps for millions of users by utilizing the concept of “pay-as-you-go” for applications, computing, network and storage resources as on-demand services. READ MORE