Sökning: "intrusion methods"
Visar resultat 1 - 5 av 79 uppsatser innehållade orden intrusion methods.
1. Quantum Espionage
Master-uppsats, KTH/Tillämpad fysikSammanfattning : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. LÄS MER
2. Är det någon som gräver efter krypto på min dator? : En studie kring hotet av kryptobrytning
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Kryptobrytning är den processen där transaktioner kryptovaluta verifieras.Idag är olaglig kryptobrytning ett stort hot då det utgör en stor del avorganiserad brottslighet. Dessutom kan skadliga kryptobrytningsprogramförkorta en dators livslängd avsevärt. LÄS MER
3. Edge Computing Security for IoT : A Systematic Literature Review
Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. LÄS MER
4. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER
5. Probability Based Path Planning of Unmanned Ground Vehicles for Autonomous Surveillance : Through World Decomposition and Modelling of Target Distribution
Master-uppsats, Linköpings universitet/ReglerteknikSammanfattning : The interest in autonomous surveillance has increased due to advances in autonomous systems and sensor theory. This thesis is a preliminary study of the cooperation between UGVs and stationary sensors when monitoring a dedicated area. The primary focus is the path planning of a UGV for different initial intrusion alarms. Cell decomposition, i. LÄS MER