Essays about: "thesis on network security"

Showing result 1 - 5 of 250 essays containing the words thesis on network security.

  1. 1. New immobilizer concept based on Scania’s electrical platform

    University essay from Högskolan i Gävle/Avdelningen för elektronik, matematik och naturvetenskap

    Author : Navid Varzandeh; [2019]
    Keywords : Immobilizer;

    Abstract : Immobilizers are security systems that are set up and installed in modern vehicles in order to prevent thieves from starting the vehicles. The idea is that if any wrong keys are used to start the vehicle, the immobilizer detects the wrong key and start the immobilization procedure to stop the vehicle from turning on. READ MORE

  2. 2. Effciency of CNN on Heterogeneous Processing Devices

    University essay from Linköpings universitet/Programvara och system

    Author : Josefin Ringenson; [2019]
    Keywords : CNN; Accelerator; Convolution; Heterogeneous Processing Device; AI Engine; FPGA; Hardware Architecture; Automotive Security; Computer Vision; Layer Fusion;

    Abstract : In the development of advanced driver assistance systems, computer vision problemsneed to be optimized to run efficiently on embedded platforms. Convolutional neural network(CNN) accelerators have proven to be very efficient for embedded camera platforms,such as the ones used for automotive vision systems. READ MORE

  3. 3. Investigating vulnerabilities in a home network with Kali Linux

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Ashraf Hamadi; [2019]
    Keywords : vulnerabilities; home network; Kali Linux; Classification; network security;

    Abstract : The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. READ MORE

  4. 4. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE

  5. 5. Visualization and Natural Language Representation of Simulated Cyber Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinyue Mao; [2018]
    Keywords : attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE