Essays about: "security"

Showing result 6 - 10 of 3390 essays containing the word security.

  1. 6. Implementation of a Deep Learning Inference Accelerator on the FPGA.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Shenbagaraman Ramakrishnan; [2020]
    Keywords : Artificial Intelligence; Machine Learning; Deep Learning; Neural Networks; Deep Learning Accelerators; NVDLA; FPGA; Technology and Engineering;

    Abstract : Today, Artificial Intelligence is one of the most important technologies, ubiquitous in our daily lives. Deep Neural Networks (DNN's) have come up as state of art for various machine intelligence applications such as object detection, image classification, face recognition and performs myriad of activities with exceptional prediction accuracy. READ MORE

  2. 7. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  3. 8. Real time Rust on multi-core microcontrollers

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Jorge Aparicio Rivera; [2020]
    Keywords : Rust; real-time; memory safety; embedded; static analysis; stack resource policy; stack analysis; arm; cortex-m;

    Abstract : Today the majority of embedded software is written in C or C++ using the thread paradigm. C and C++ are memory unsafe programming languages that often appear in CVE (Common Vulnerability and Exploits) reports. READ MORE

  4. 9. Development of a GIS-based multiprocessing modelling approach for assessing the wind and solar potential in Mongolia

    University essay from KTH/Energi och klimatstudier, ECS

    Author : Alexander Harrucksteiner; [2020]
    Keywords : ;

    Abstract : Despite the vast wind and solar energy potential, Mongolia is still highly depended on coal-fired electricity generation. At the same time, the pressure on Governments is increased due to the urgency to fight climate change. READ MORE

  5. 10. The Role of the EU in the Israeli-Palestinian Conflict : A Qualitative Case Study on the Role of the EU in the Israeli-Palestinian Conflict approached through realism, liberalism and constructivism.

    University essay from Linnéuniversitetet/Institutionen för statsvetenskap (ST)

    Author : Elvira Sofic; [2020]
    Keywords : European Union; Palestine; Israel; Interests; Security; Military; Interdependence; International Law; Identity; Norms;

    Abstract : For over four decades, the EU has been an active external actor in the Israeli-Palestinian peace process. However, the role that the EU has in the conflict, have many times been questioned. READ MORE