Essays about: "simulation in network security"
Showing result 1 - 5 of 44 essays containing the words simulation in network security.
-
1. Analysis of the security of a VXLAN network
University essay from KTH/Hälsoinformatik och logistikAbstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE
-
2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
3. Study Of Universal Islanding Detection Techniques In Distributed Generation Systems
University essay from Linnéuniversitetet/Institutionen för fysik och elektroteknik (IFE)Abstract : Energy security, global warming, and climate change have been a major source of global discussions and development. Likewise, the rising cost of electricity for consumers and exponential demand for energy are major factors driving the incremental growth and integration of sustainable forms of energy generation into power the system cycle. READ MORE
-
4. Fog detection using an artificial neural network
University essay from Lunds universitet/Matematisk statistikAbstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE
-
5. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE