Search for dissertations about: "NETWORK security in port"

Found 5 swedish dissertations containing the words NETWORK security in port.

  1. 1. CryptoNET : Generic Security Framework for Cloud Computing Environments

    Author : Abdul Ghafoor Abbasi; Sead Muftic; Antonio F. Gómez Skarmeta; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Generic Security Object; CryptoNET; Security; Framework; Information technology; Informationsteknologi; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE

  2. 2. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Distributed Denial-of-Service; Network Security; Distributed Computing; System Design;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. READ MORE

  3. 3. Service, Regulations, and Ports : An Actor-Network perspective on the social dimension of Service-Dominant Logic

    Author : Mattias Wengelin; Institutionen för tjänstevetenskap; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Service-Dominant Logic; Port security; Service Studies;

    Abstract : Something has happened in the field of Service Studies. With the introduction of what has been called Service Dominant Logic a large proportion of the established theories related to service as a phenomenon has been challenged. From previously having been defined as something different from the tangible things we buy (goods); i.e. READ MORE

  4. 4. Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Data Streaming; Network Security; Overlay; Distributed Denial-of-Service; System Design; DDoS Detection; Distributed Computing;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. READ MORE

  5. 5. Planar-Goubau-line components for terahertz applications

    Author : Juan Cabello Sánchez; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; planar Goubau line; Through-Reflect-Line TRL calibration; stopband filter; on-wafer measurements; vector network analyzers VNA ; silicon membrane; power divider; Impedance-matched load; terahertz spectroscopy; microfluidic channels;

    Abstract : Terahertz-wave technology has a broad range of applications, including radio astronomy, telecommunications, security, medical applications, pharmaceutical quality control, and biological sensing. However, the sources, detectors, and components are less efficient at this frequency band due to parasitic effects and increased total losses, which hinder the performance of terahertz systems. READ MORE