Essays about: "thesis for NETWORK SECURITY solutions"

Showing result 1 - 5 of 77 essays containing the words thesis for NETWORK SECURITY solutions.

  1. 1. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, thein-vehicle network has increased in complexity, now consisting of over 100 electricalcontrol units. Balancing the level of security with high performance is non-trivial,and current networks have shown to sacrifice security measures for performance,therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  2. 2. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW

    University essay from Uppsala universitet/Informationssystem

    Author : Marie Jeanne Tuyisenge; [2021]
    Keywords : Blockchain technology;

    Abstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE

  3. 3. Enhancing IoT Security Using 5G Capabilities

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Ankush Makkar; [2021]
    Keywords : IoT; Security; 5G Security; 5G Core Network; 5G IoT; Authentication; Applications Security; Network Layer; Smart Factories; Smart Grid; Industry 4.0;

    Abstract : Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially. READ MORE

  4. 4. Investigation on how presentation attack detection can be used to increase security for face recognition as biometric identification : Improvements on traditional locking system

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Fredrik Öberg; [2021]
    Keywords : Face Recognition; Presentation Attacks; Convolutional Neural Network;

    Abstract : Biometric identification has already been applied to society today, as today’s mobile phones use fingerprints and other methods like iris and the face itself. With growth for technologies like computer vision, the Internet of Things, Artificial Intelligence, The use of face recognition as a biometric identification on ordinary doors has become increasingly common. READ MORE

  5. 5. Investigating Security Aspects of Cryptocurrency Wallets - a Systematic Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Philipp Schmid; Sabine Houy; [2021]
    Keywords : Cryptocurrency Wallets; Vulnerabilities; Weaknesses; Crypto Wallet; Countermeasures; Security; Blockchain; Mobile Wallet; Mobile;

    Abstract : Cryptocurrencies are gaining prominence among individuals and companies alike, resulting in the growing adoption of so-called cryptocurrency wallet applications, as these simplify carrying out transactions. These wallets are available in a myriad of different forms and specifications. For example, there are hardware and software wallets. READ MORE