Essays about: "os"

Showing result 11 - 15 of 265 essays containing the word os.

  1. 11. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  2. 12. Understanding the Impact of OS Background Noise with a Custom Performance Evaluation Tool

    University essay from Uppsala universitet/Datalogi

    Author : Daniel Westberg; [2023]
    Keywords : application performance; linux; operating system noise; correlation analysis;

    Abstract : Understanding the background activity of a computer and its operating system when running an arbitrary application can lead to important performance discoveries. This is especially interesting in cases where the same task of an application is run over and over again and there is an expected run time, such as in testing. READ MORE

  3. 13. Multifinality in Ontological Security Theory : A Methodological Framework

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Frida Lampinen; [2023]
    Keywords : Ontological security; OST; Multifinality; China;

    Abstract : This thesis problematizes the incomplete understanding of multifinality in ontological security theory. The literature suggests two different interpretations of OST, but the relationship between these has so far received insufficient attention. READ MORE

  4. 14. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE

  5. 15. Activity quantification of 177Lu using a 360◦ CZT gamma camera - comparison with a dual-head Anger camera

    University essay from Lunds universitet/Sjukhusfysikerutbildningen

    Author : Albin Lindvall; [2023]
    Keywords : Medicine and Health Sciences;

    Abstract : Background and Aim: New SPECT cameras that use CZT detectors in a 360◦ configuration has recently been introduced. Together with Bayesian reconstruction methods employing Median Root Prior (MRP) and Relative Difference Prior (RDP), this constitutes an alternative to Anger-based SPECT for activity quantification. READ MORE