Essays about: "security device thesis"
Showing result 6 - 10 of 168 essays containing the words security device thesis.
-
6. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE
-
7. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
8. Formally Verified Remote Attestation Protocols with Strong Authentication
University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakultetenAbstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE
-
9. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
10. The design of evacuation alarms for people who are deaf or hard of hearing
University essay from Lunds universitet/Avdelningen för BrandteknikAbstract : The ability to hear is essential for receiving auditory signals, which serve as warnings and alerts in many situations, including fire evacuation. However, people with hearing impairments may miss out such signals and can be exposed to dangerous situations. READ MORE