Essays about: "thesis for NETWORK SECURITY"

Showing result 26 - 30 of 456 essays containing the words thesis for NETWORK SECURITY.

  1. 26. Assessing the threat of Stingrays in 4G cellular networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Emil Karim; Sina Khoraman; [2023]
    Keywords : Cellular network; Wireless communication; Stingray; Privacy; Surveillance; Tracking; 4G; Software-defined radio; Cellulärt nätverk; Trådlös kommunikation; Stingray; Integritet; Övervakning; Spårning; 4G; Mjukvarudefinierad radio;

    Abstract : This bachelor thesis explores the threat of Stingrays, fake cell towers, to the mobile network. The increasing availability of open-source technology and hardware has made it easier to build Stingrays. READ MORE

  2. 27. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 28. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ajdin Buljubasic; [2023]
    Keywords : Bachelor Thesis; Drones; Communication; Security; Högskoleingenjör examensarbete; Drönare; Kommunikation; Säkerhet;

    Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE

  4. 29. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  5. 30. Using Approximate Computing Circuits to Optimize Power of an ASIC

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Padmashree Nuggehalli Srinivasa; Shi-Tien Hsing; [2023]
    Keywords : ASIC; Power; Optimization; Approximate Arithmetic Circuits; Approximate Computing; Technology; Technology and Engineering;

    Abstract : The growing demand for network cameras to support real-time image processing and machine-learning applications has created a need for low-power solutions. Although technology scaling makes complex computations feasible, voltage scaling is limited, leading to higher power density and dark silicon problems. READ MORE