Sökning: "Computer security"
Visar resultat 26 - 30 av 366 avhandlingar innehållade orden Computer security.
26. Design and Analysis of Self-protection : Adaptive Security for Software Systems
Sammanfattning : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. LÄS MER
27. Guesswork and Entropy as Security Measures for Selective Encryption
Sammanfattning : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. LÄS MER
28. Securing Communication in IP-Connected Industrial Wireless Sensor Networks
Sammanfattning : With the advent of wireless sensor networks (WSN) and success of wirelesscommunication in the local and personal area networks such asWi-Fi and Bluetoothmore serious efforts to apply standard wireless communication in sensitiveindustrial networks were initiated. This effort resulted in the standardizationof WirelessHART. LÄS MER
29. Towards Secure SIP Signalling Service for VoIP applications : Performance-related Attacks and Preventions
Sammanfattning : Current Voice over IP (VoIP) services are regarded less secure than the traditional public switched telephone network (PSTN). This is due to the fact that VoIP services are frequently deployed in an relatively open environment so that VoIP infrastructures can be easily accessed by potential attackers. LÄS MER
30. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods
Sammanfattning : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. LÄS MER