Essays about: "thesis in network monitoring software"
Showing result 1 - 5 of 42 essays containing the words thesis in network monitoring software.
-
1. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE
-
2. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
3. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
4. COMPARATIVE ANALYSIS OF SOFTWARE SOLUTIONS FOR NETWORK ATTACKS SIMULATION : Thesis for the Degree of Master of Science (60 credits) in ComputerScience with the Specialization in Software Engineering, 15.0 credits
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The excessive use of the Internet had an impact on the increasing number of network attacks.The aim of a network attack is to gain unauthorized access to the network, with the intention ofstopping that service or monitoring and stealing private data. READ MORE
-
5. An Empirical Study on AI Workflow Automation for Positioning
University essay from Linköpings universitet/Programvara och systemAbstract : The maturing capabilities of Artificial Intelligence (AI) and Machine Learning (ML) have resulted in increased attention in research and development on adopting AI and ML in 5G and future networks. With the increased maturity, the usage of AI/ML models in production is becoming more widespread, and maintaining these systems is more complex and likely to incur technical debt when compared to standard software. READ MORE