Essays about: "thesis on network security"

Showing result 1 - 5 of 366 essays containing the words thesis on network security.

  1. 1. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE

  2. 2. Soviet intelligence in Stockholm during World War II: A social network analysis

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Björn Lundberg; [2022]
    Keywords : Social network theory; social network analysis; Venona; KGB; NetDraw; Usinet; World War two; Intelligence; dark networks; criminal networks; Mercyhurst College; National security agency; NSA; cables; Law and Political Science;

    Abstract : In this thesis social network analysis is applied on the Venona project KGB cables between Stockholm and Moscow during the World War two. The method is quantitative where words are extracted according to two different coding sheets and structured in tables. Software is then used for calculations and visualization. READ MORE

  3. 3. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control

    University essay from Uppsala universitet/Avdelningen för visuell information och interaktion

    Author : Gustav Norvik; [2022]
    Keywords : facial recognition; deep learning; machine learning; computer vision; image processing; artificial intelligence;

    Abstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE

  4. 4. Security Analysis of Volvo’s Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dana Ismail; Porsev Aslan; [2022]
    Keywords : Threat Modeling; Attack Simulations; Risk Analysis; Cybersecurity; Infotainment System; Vehicle Security; Hotmodeller; Attacksimuleringar; Riskanalys; Cybersäkerhet; Infotainmentsystem; Fordonssäkerhet;

    Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE

  5. 5. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE