Essays about: "thesis for NETWORK SECURITY"
Showing result 21 - 25 of 392 essays containing the words thesis for NETWORK SECURITY.
-
21. Efficient Memory Encryption for Neural Network Accelerators
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE
-
22. Fog detection using an artificial neural network
University essay from Lunds universitet/Matematisk statistikAbstract : This project studies a method of image-based fog detection directly from a camera without using the transmissometer. Fog can be detected using transmissometers which could be a very costly approach. This thesis presents an image-based approach for fog detection using Artificial Neural networks. READ MORE
-
23. Securing Real Estate: Wireless Integration and Device Security
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : For decades, wired systems have been utilized when connecting operational technology devices to internal real estate systems. With the advancement of new technologies, there is a growing trend toward wireless communication in this domain, necessitating further research and exploration. READ MORE
-
24. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
25. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE