Essays about: "thesis on network security"

Showing result 1 - 5 of 295 essays containing the words thesis on network security.

  1. 1. Deep Learning and the Heston Model:Calibration & Hedging

    University essay from Göteborgs universitet/Institutionen för nationalekonomi med statistik

    Author : Oliver Klingberg Malmer; Victor Tisell; [2020-07-03]
    Keywords : deep learning; deep hedging; deep calibration; option pricing; stochastic volatilty; Heston model; S P 500 index options; incomplete markets; transaction costs;

    Abstract : The computational speedup of computers has been one of the de ning characteristicsof the 21st century. This has enabled very complex numerical methods for solving existingproblems. As a result, one area that has seen an extraordinary rise in popularity over the lastdecade is what is called deep learning. READ MORE

  2. 2. Erlang as an alternative to a non-functional language for communication in a faulttolerant IoT sensor network

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Jimmy Holdö; [2020-02-17]
    Keywords : Internet of Things; Wireless Sensor Network; Erlang; IEEE 802.15.4; ZigBee; Network topology;

    Abstract : This thesis compares a C++ prototype and an Erlang prototype for an Internet ofThings application. Internet of Things applications are difficult to program becausethey consist of a distributed environment of heterogeneous devices, where each devicecan have limited resources and connectivity technologies. READ MORE

  3. 3. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  4. 4. azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ningyao Geng; [2020]
    Keywords : Threat modelling; Microsoft Azure; MAL; Cloud computing; azureLang; Hotmodellering; Microsoft Azure; MAL; Cloud computing; azureLang;

    Abstract : When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. READ MORE

  5. 5. Development of Generic Communication Middleware for Embedded Sensor Systems Transmitting Health Parameters

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik; Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Subaharan Kailayanathan; Saji Kamdod; [2020]
    Keywords : Health technology; e-Health; Embedded Sensor Systems; Middleware; IPSec; MQTT; Cyber Security; Bluetooth 5.0;

    Abstract : Health technology or e-Health is one of the most rapidly growing areas in healthcare today and it has been an important requirement as a new concept of healthcare industry. Since global society has been changed to aging society and the healthcare cost has been increasing in the 21st century since 2007. READ MORE