Advanced search
Showing result 1 - 5 of 41 essays matching the above criteria.
-
1. Early-Stage Validation of Autonomous Vehicles in Ambiguous Environments : A Systems-Theoretic Process Analysis (STPA) of an Autonomous Military Defense Industry Vehicle
University essay from Linköpings universitet/FordonssystemAbstract : This report delves into the early developmental phase of an autonomous vehicle designed for defense applications. Navigating diverse terrains, this unmanned ground vehicle (UGV) poses unique challenges, particularly in the absence of clearly defined directives found in typical traffic scenarios. READ MORE
-
2. Security evaluation of the Matrix Server-Server API
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE
-
3. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE
-
4. The industry adoption of innovative safety-analysis approaches for autonomous vehicles : A case study exploring the industry adoption of model-based safety analysis
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : In recent years, autonomous vehicles have been gaining traction as a technology that can revolutionize society and save approximately $800 billion per year in the U.S. alone. However, due to their complex and dynamic behavior, ensuring the safety of these vehicles has proven to be a challenge for traditional safety analysis methods. READ MORE
-
5. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE