Essays about: "security in operating systems"

Showing result 1 - 5 of 87 essays containing the words security in operating systems.

  1. 1. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  2. 2. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  3. 3. A Decision Support System for Evaluating Kernel And Operating System Security in Embedded Systems

    University essay from Blekinge Tekniska Högskola

    Author : Jonathan Olsson; [2023]
    Keywords : ;

    Abstract : .... READ MORE

  4. 4. Factors influencing the adoption of warehousing 4.0 by manufacturing companies in developing countries: A case study of Sri Lanka and Cameroon

    University essay from Linnéuniversitetet/Institutionen för management (MAN)

    Author : Tafuh Modeste Tse; Chanika Weerathunga; Heshani Wijewardana; [2023]
    Keywords : Warehousing 4.0; Raw Material Warehouse; Critical factors; Adoption of Warehousing 4.0; Developing countries; manufacturing companies;

    Abstract : The purpose of this thesis is to comprehend the concept of warehousing 4.0 and to examine the critical factors influencing its adoption in developing countries. while at the same time exploring how manufacturing companies can address these factors prior to adopting warehousing 4.0. READ MORE

  5. 5. Secure satellite internet usage in high-risk areas

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Andreas Kvant; Carl Johansson; [2023]
    Keywords : satellite internet; high-risk area; threats; risks; mitigations; satellit internet; högriskområden; hot; risker; åtgärder;

    Abstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE