Sökning: "identifier"
Visar resultat 1 - 5 av 58 uppsatser innehållade ordet identifier.
1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER
2. Evaluating intrusion detection points in an end-to-end solution
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER
3. Evaluating Thread network performance, locating and strengthening weak radio links
Master-uppsats, Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakultetenSammanfattning : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. LÄS MER
4. Tenant Separation on a multi-tenant microservice platform
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. LÄS MER
5. Time evaluation of lookups with Robin Hood Hashing and Linear Probing
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Hash tables are used to store data in a way that is quickly retrieved from an array using the identifier of the data. When inserting data into a hash table it will sometimes attempt to place the data on a position in the array where there already exists data which means these collisions need to be handled. LÄS MER