Sökning: "abstract of NETWORK SECURITY"

Visar resultat 1 - 5 av 15 uppsatser innehållade orden abstract of NETWORK SECURITY.

  1. 1. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Srinath Potnuru; [2021]
    Nyckelord :RRC; 5G NR; robustness testing; fuzzing; ASN.1; network protocol testing; vulnerability detection; software security; RRC; 5G NR; robusthetstest; fuzzing; ASN.1; nätverksprotokolltestning; sårbarhetsdetektering; mjukvarusäkerhet;

    Sammanfattning : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. LÄS MER

  2. 2. Evaluating Robustness of a CNN Architecture introduced to the Adversarial Attacks

    Kandidat-uppsats, Blekinge Tekniska Högskola

    Författare :Shaik Ishak; Anantaneni Jyothsna Chowdary; [2021]
    Nyckelord :Convolutional Neural Network CNN ; Image classification; Adversarial attacks; Defensive Distillation.;

    Sammanfattning : Abstract: Background: From Previous research, state-of-the-art deep neural networks have accomplished impressive results on many images classification tasks. However, adversarial attacks can easily fool these deep neural networks by adding little noise to the input images. LÄS MER

  3. 3. Mantis The Black-Box Scanner : Finding XSS vulnerabilities through parse errors

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Johan Liljebjörn; Hugo Broman; [2020]
    Nyckelord :XSS; Reflected parameter; Vulnerability scanner; Scalability;

    Sammanfattning : Abstract [en] Background. Penetration testing is a good technique for finding web vulnerabilities. Vulnerability scanners are often used to aid with security testing. The increased scope is becoming more difficult for scanners to handle in a reasonable amount of time. LÄS MER

  4. 4. Challenges of Multimodal Transport Services:The Case of Ethiopian Shipping and Logistics Service Enterprise : Ethiopia- Sweden-Denmark and UK trade routes operation

    Magister-uppsats, Linnéuniversitetet/Institutionen för marknadsföring (MF)

    Författare :Habtesilase Ketema Demse; [2018]
    Nyckelord :Logistics; Multimodal Transport Service; Multimodal transport operator; Shipping Agents; Shippers; and Supply Chain;

    Sammanfattning : Abstract Purpose: is to identify the challenges of multimodal transport service of ESLSE in the Europe trade routes operation from origin up to destination and to analyze the contribution of network partners to ESLSE solving these challenges.   Design\Data collection\Approach: This thesis relied on qualitative research design in order to identify the key challenges of multimodal transport services and to show how the network partners contribute to solving these challenges. LÄS MER

  5. 5. Virtual Firewalling For Migrating Virtual Machines In Cloud Computing

    Master-uppsats, Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Författare :Mahwish Anwar; [2013]
    Nyckelord :virtual machine; migration; firewall;

    Sammanfattning : Context. Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. LÄS MER