Essays about: "security over network"
Showing result 1 - 5 of 185 essays containing the words security over network.
-
1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE
-
2. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE
-
3. Exploring information security culture within Swedish municipalities : A qualitative study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The human aspect in the context of security has been a well-debated topic over the last two decades among researchers and practitioners. It has been recognized that technology alone cannot provide full protection, but should be combined with information security culture. READ MORE
-
4. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE
-
5. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE