Essays about: "thesis for IP"
Showing result 11 - 15 of 436 essays containing the words thesis for IP.
-
11. Locating the Unlocated : An Examination of Choice of Law and Consumer Protection in Cryptocurrency Trading
University essay from Uppsala universitet/Juridiska institutionenAbstract : Disputes involving emerging technology, often leave a grey area on applicable law, as it is unlocated in the physical world. The problem with crypto-assets is partly driven by their underlying technology, allowing for the assets to be distributed in an international, digital sphere, and making it hard to pinpoint their territorial location and solve legal issues. READ MORE
-
12. EU Copyright and Trade Mark Law: a unifying lens for the protection of Fashion Designs? : Analysis and research into a better understanding of the concepts of originality and distinctiveness
University essay from Stockholms universitet/Juridiska institutionenAbstract : As one of the largest and most important sectors, the fashion industry holds a significant position in the global economy. Consequently, ensuring legal protection for fashion designs is of utmost importance to designers and fashion brands alike. As sui generis regime, EU design rights are tailored to the protection of fashion. READ MORE
-
13. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
14. Power Estimation Tool for Digital Front-End 5G Radio ASIC
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Application Specific Integrated Circuits (ASICs) are critical to delivering on 5G’s promises of high speed, low latency, and expanded capacity. Digital Front-End (DFE) ASICs are particularly important components because they enhance crucial signal processing activities. READ MORE
-
15. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE