Essays about: "software security model"
Showing result 1 - 5 of 133 essays containing the words software security model.
-
1. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE
-
2. Model Based Testing for Programmable Data Planes
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. READ MORE
-
3. Automated Vulnerability Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of software security is constantly evolving, and security must be taken into consideration throughout the entire product life cycle. This is particularly important in today’s dynamic security landscape, where threats and vulnerabilities constantly change. READ MORE
-
4. Harnessing Hydrogen and Batteries: Hybrid Energy Storage System for Versatile and Profitable Renewable Power Production
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : This thesis explores the integration of hydrogen and battery energy storage systems as a means to enhance the management of wind and solar power in the pursuit of a greener grid. The objective of the study is to identify the potential benefits and challenges associated with hybrid energy storage systems (HESS) and their role in renewable energy integration. READ MORE
-
5. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE