Essays about: "security device thesis"
Showing result 1 - 5 of 141 essays containing the words security device thesis.
-
1. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE
-
2. Battery-less IoT Devices: Energy Source Manipulation Attacks
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things (IoT) is expected to enable applications of utmost societal value, such as energy-efficient buildings, smart cities, and next-generation healthcare. While there has been a lot of progress on the security of larger devices, there is a need to consider the security of resource-constrained devices. READ MORE
-
3. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE
-
4. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE
-
5. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
