Sökning: "Traditional Network-based Security"

Hittade 5 uppsatser innehållade orden Traditional Network-based Security.

  1. 1. Detektionsmetoder för skadlig kod i IoT-baserat smart hem : En systematisk litteraturstudie

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :William Saxmark; [2023]
    Nyckelord :Malware; botnet; detection; IoT; smart home; methods; Skadlig kod; botnät; detektion; IoT; smarta hem; metoder;

    Sammanfattning : IoT devices are being widely deployed within smart homes. Most of these devices are mass-produced at a low cost. As a result, due to the lack of security mechanisms, IoT devices become vulnerable to malware. LÄS MER

  2. 2. Selective Kernel Network based Crowding Counting and Crowd Density Estimation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Jinchen Liu; [2023]
    Nyckelord :Crowding Counting; Convolution Neural Network; Selective kernel; Trängselräkning; konvolutionsneuralnätverk; Selektiv kärna;

    Sammanfattning : Managing crowd density has become an immense challenge for public authorities due to population growth and evolving human dynamics. Crowd counting estimates the number of individuals in a given area or scene, making it a practical technique applicable in real-world scenarios such as surveillance and traffic control. LÄS MER

  3. 3. Zero Trust Adoption : Qualitative research on factors affecting the adoption of Zero Trust

    Master-uppsats, Uppsala universitet/Informationssystem

    Författare :Jennifer Hansen; [2022]
    Nyckelord :Zero Trust; Traditional Network-based Security; Perimeter-based Security; End-users; Implementation; IS Adoption; IS Security; IS Security Innovation Adoption;

    Sammanfattning : The following qualitative research explores the adoption of Zero Trust in organisations from an organisational and user acceptance perspective. From an organisational perspective, the research highlights essential aspects such as testing the Zero Trust architecture in a pre-adoption phase, involving top management in the planning phase, communicating in a non-technical language, and making end-users feel a personal connection to IS security. LÄS MER

  4. 4. From MPLS to SD-WAN: Opportunities, Limitations and Best Practices

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Cleo Luciani; [2019]
    Nyckelord :;

    Sammanfattning : This thesis deals with Software-Defined Wide Area Networks (SD-WAN). It defines the term, presents its different variations available on the market and contrasts it to a typical MPLS network, based on criteria such as quality of service, link aggregation capabilities and price. LÄS MER

  5. 5. Analys av datakommunikationssäkerhet för VoIP-protokoll

    M1-uppsats, KTH/Data- och elektroteknik

    Författare :Sanhawad Boongerd; Fredrik Lindstein; [2012]
    Nyckelord :Swedish Armed Forces; Voice over IP; H.323; SIP; network security and countermeasures; voice and video communication.; Försvarsmakten; Voice over IP; H.323; SIP; säkerhetsrisker och -åtgärder; röst och videokommunikation.;

    Sammanfattning : Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. LÄS MER