Essays about: "thesis on system security"

Showing result 1 - 5 of 853 essays containing the words thesis on system security.

  1. 1. "The Competition of Values in the European Arrest Warrant Tracing the Conflict and Prioritization Between Collective Security and Individual Justice Within Case Law of the CJEU"

    University essay from Göteborgs universitet/Juridiska institutionen

    Author : Nadja Nordlund; [2024-02-16]
    Keywords : European Arrest Warrant; Mutual Recognition; Effective Law Enforcement; International Cooperation; Procedural Justice; Rule of Law; Right to a Fair Trial; Proportionality;

    Abstract : The European Arrest Warrant system is built on balancing between individual justice, which safeguards the right to a fair trial of subjects to extradition, and collective security, which seeks to ensure public safety and effective law enforcement. This thesis provides for an analysis of this balance and its evolution, exploring how the prioritization of individual justice and collective security, as manifested in the EAW, have shifted through the evolutive interpretation of the Court of Justice of the European Union. READ MORE

  2. 2. Physical Layer Security for MIMOTransmission of Short PacketCommunications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Varun Duvva; Bharath Reddy Anugu; [2024]
    Keywords : Physical Layer Security; Multiple-Input Multiple-Output; Short Packet communication; Maximum Ratio Combining; Maximum Ratio Transmission; and Beamforming;

    Abstract : This thesis explores the practical application of Physical Layer Security (PLS) inMultiple-Input Multiple-Output (MIMO) systems, particularly focusing on ShortPacket Communication (SPC). The aim is to enhance the security of wireless com-munications against eavesdropping threats. READ MORE

  3. 3. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  4. 4. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  5. 5. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE