Sökning: "Systems identification"

Visar resultat 1 - 5 av 941 avhandlingar innehållade orden Systems identification.

  1. 1. Duplicate systems : investigating unintended consequences of information technology in organizations

    Författare :Henrik Wimelius; Jonny Holmström; Lars Mathiassen; Jan Damsgaard; Umeå universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; IS and organization; adoption of IT; assimilation of IT; change; dialectics; paradox; duplicate systems; contradiction; unintended consequences; information systems; Informatics; Informatik;

    Sammanfattning : The organizational consequences of information technology (IT) constitutes a core focus in information systems (IS) research. The relationship between organizations and IT has received considerable attention by IS researchers in order to develop knowledge related to how and why organizations and IT are related. LÄS MER

  2. 2. Advancing Automation in Digital Forensic Investigations

    Författare :Irvin Homem; Panagiotis Papapetrou; Fredrik Blix; Indre Žliobaitė; Stockholms universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Digital Forensics; Machine Learning; Computer Forensics; Network Forensics; Predictive Modelling; Distributed Systems; Mobile Devices; Mobile Forensics; Memory Forensics; Android; Semantic Web; Hypervisors; Virtualization; Remote Acquisition; Evidence Analysis; Correlation; P2P; Bittorrent; Computer and Systems Sciences; data- och systemvetenskap;

    Sammanfattning : Digital Forensics is used to aid traditional preventive security mechanisms when they fail to curtail sophisticated and stealthy cybercrime events. The Digital Forensic Investigation process is largely manual in nature, or at best quasi-automated, requiring a highly skilled labour force and involving a sizeable time investment. LÄS MER

  3. 3. Design and Identification of Wireless Transmitters for a Low-power and Secure Internet of Things

    Författare :Wenqing Yan; Christian Rohner; Thiemo Voigt; Ambuj Varshney; Haitham Hassanieh; Uppsala universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Wireless transmitters; Wireless embedded systems; Physical-layer security; Radiometric fingerprinting; Radio frequency fingerprinting; Identification; Authentication; Backscatter communication; Internet of Things; Electrical Engineering with Specialisation in Networked Embedded Systems; Elektroteknik med inriktning mot nätverksbaserade inbyggda system; Computer Science with specialization in Computer Communication; Datavetenskap med inriktning mot datorkommunikation;

    Sammanfattning : Wireless communication is a key enabler for connecting billions of Internet of Things devices. For networked embedded devices operating on limited energy resources, wireless communication dominates the power consumption. LÄS MER

  4. 4. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Författare :Thomas Rosenstatter; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure communication; V2X; cyber-physical systems; resilience; in-vehicle network; automotive;

    Sammanfattning : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. LÄS MER

  5. 5. An Empirical Study of the Global Behavior of Structured Overlay Networks as Complex Systems

    Författare :Ruma R. Paul; Vladimir Vlassov; Alberto Montresor; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Complex Computing Systems; Designing Complex Systems; Structured Overlay Networks; Hostility of Operating Environments of Computing Systems; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Distributed applications built on top of Structured Overlay Networks (SONs) operate based on certain self-* behaviors of the underlying Peer-to-Peer network. Among those, self-organization and self-healing are the two most prominent and assumed properties. LÄS MER