Avancerad sökning
Visar resultat 1 - 5 av 33 uppsatser som matchar ovanstående sökkriterier.
1. Primary Drivers of Sea Level Variability in the North – Baltic Sea Transition Using Machine Learning
Master-uppsats, Göteborgs universitet/Institutionen för geovetenskaperSammanfattning : Global mean sea level is rising, however not uniformly. Regional deviations of sea surface height (SSH) are common due to local drivers, including surface winds, ocean density stratifications, vertical land- & crustal movements and more. LÄS MER
2. Analysing SSH Clients Using Protocol State Fuzzing
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : .... LÄS MER
3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. LÄS MER
4. Developing a modular, high-interaction honeypot using container virtualization
Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. LÄS MER
5. Masquerader Detection via 2fa Honeytokens
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER