Search for dissertations about: "Secure and Resilient Computer Systems"

Showing result 1 - 5 of 6 swedish dissertations containing the words Secure and Resilient Computer Systems.

  1. 1. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Author : Thomas Rosenstatter; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure communication; V2X; cyber-physical systems; resilience; in-vehicle network; automotive;

    Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE

  2. 2. Security and Self-stabilization in Sensor Network Services

    Author : Andreas Larsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Clock-synchronization; Secure and Resilient Computer Systems; Ad-hoc Networks; Self-Stabilization; Sensor-Network Systems; Clustering;

    Abstract : Wireless sensor networks consist of small sensor nodes that monitor their environment and that together can cover vast geographical regions. It is a promising field with many possible applications in different application areas. Typically the nodes do not have any preexisting information about the network topology when deployed. READ MORE

  3. 3. Cooperative Privacy and Security for Mobile Systems

    Author : Hongyu Jin; Panagiotis Papadimitratos; Tuomas Aura; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Abstract : The growing popularity of powerful mobile devices, along with increased computation and storage of computing infrastructure, opened possibilities for versatile mobile system applications. Users, leveraging sensing capabilities of the devices, can collect rich data and exchange the data with diverse Service Providers (SPs) or their close neighboring devices. READ MORE

  4. 4. Vulnerability and Risk Analysis Methods and Application in Large Scale Development of Secure Systems

    Author : Shanai Ardi; Kristian Sandahl; Nahid Shahmehri; Edgar Weippl; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Since software products are heavily used in today’s connected society, design and implementation of such software products to make them resilient to security threats become crucial.This thesis addresses some of the challenges faced by software vendors when developing secure software. READ MORE

  5. 5. Machine learning for anomaly detection in edge clouds

    Author : Javad Forough; Erik Elmroth; Monowar H. Bhuyan; Shahid Raza; Umeå universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Edge Clouds; Anomaly Detection; Machine Learning;

    Abstract : Edge clouds have emerged as an essential architecture, revolutionizing data processing and analysis by bringing computational capabilities closer to data sources and end-users at the edge of the network. Anomaly detection is crucial in these settings to maintain the reliability and security of edge-based systems and applications despite limited computational resources. READ MORE