Essays about: "thesis in security information systems"
Showing result 1 - 5 of 223 essays containing the words thesis in security information systems.
-
1. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE
-
2. Risk Analysis and Cybersecurity Implementation for UTM : Implemented in UTM50
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : With the increasing usage of Unmanned Aerial Vehicle (UAV)s and the prediction of becoming applicable to more industries within the next decade there is a need for a controlling authority in the lower airspace. An Unmanned Aircraft System Traffic Man- agement (UTM) provides multiple solutions to how such a system should operate and what services it should provide. READ MORE
-
3. Visual Communication in Driving Social Innovation for Disadvantaged groups in Nami
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : This master’s thesis aims to explore the potential of visual communication as a powerful tool for promoting change and impact in Namibia with a focus on sustainable agriculture and food security. The study analyzes how graphic design and visual communication may effectively explain best practices for sustainable farming and inspire young adults in rural communities to engage with agriculture through empirical research. READ MORE
-
4. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE
-
5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE