Essays about: "thesis on system security"
Showing result 1 - 5 of 853 essays containing the words thesis on system security.
-
1. "The Competition of Values in the European Arrest Warrant Tracing the Conflict and Prioritization Between Collective Security and Individual Justice Within Case Law of the CJEU"
University essay from Göteborgs universitet/Juridiska institutionenAbstract : The European Arrest Warrant system is built on balancing between individual justice, which safeguards the right to a fair trial of subjects to extradition, and collective security, which seeks to ensure public safety and effective law enforcement. This thesis provides for an analysis of this balance and its evolution, exploring how the prioritization of individual justice and collective security, as manifested in the EAW, have shifted through the evolutive interpretation of the Court of Justice of the European Union. READ MORE
-
2. Physical Layer Security for MIMOTransmission of Short PacketCommunications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE
-
3. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
4. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
5. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE