Essays about: "steal"

Showing result 1 - 5 of 36 essays containing the word steal.

  1. 1. Secrecy Capacity of Cooperative Transmission with Opportunistic Relaying Scheme

    University essay from

    Author : Dhathri Pravallika Pasumarthi; [2022]
    Keywords : Cooperative Transmission; Opportunistic Relaying; Decode-and-Forward; Outage Probability; Secrecy Capacity; Fading.;

    Abstract : The usage of wireless communication has increased over the past few years. Most wired communications are replaced by wireless communication for ease of use. Wireless communication transfers confidential information like personal information and credentials between two entities. READ MORE

  2. 2. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    University essay from KTH/Datavetenskap

    Author : André Österlund; Nils Odin; [2022]
    Keywords : ;

    Abstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE

  3. 3. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Henrik Lindstedt; [2022]
    Keywords : MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Abstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE

  4. 4. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 5. Internet of Things : A qualitative study about people’s knowledge of IoT and concerns in using IoT devices

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Adam Beskow; [2021]
    Keywords : IoT Internet of Things ; Survey study; People’s knowledge of IoT; Privacy;

    Abstract : Internet of Things (IoT) devices often described as Smart products for consumers consists ofphysical things that inherit an Internet connection and therefore enable physical things to talkbetween each other and with people. IoT is a growing market with products existing in e.g.,consumers' homes, healthcare, or industries. READ MORE