Search for dissertations about: "security metrics"

Showing result 16 - 20 of 23 swedish dissertations containing the words security metrics.

  1. 16. Performance evaluation of safety critical ITS-G5 V2V communications for cooperative driving applications

    Author : Nikita Lyamin; Alexey Vinel; Magnus Jonsson; Boris Bellalta; Geert Heijenk; Högskolan i Halmstad; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; C-ITS; VANET; ITS-G5; IEEE 802.11p; ETSI; platooning; C-ACC; jamming Denial-of-Service attack; congestion control; cooperative awareness; security in C-ITS;

    Abstract : Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. READ MORE

  2. 17. Towards Measuring & Improving Source Code Quality

    Author : Umar Iftikhar; Nauman bin Ali; Jürgen Börstler; Muhammad Usman; Miroslaw Ochodek; Blekinge Tekniska Högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Source code quality; Code review analysis; Software quality improvement; Programvaruteknik; Software Engineering;

    Abstract : Context: Software quality has a multi-faceted description encompassing several quality attributes. Central to our efforts to enhance software quality is to improve the quality of the source code. Poor source code quality impacts the quality of the delivered product. READ MORE

  3. 18. On Mobility Solutions in Heterogeneous Networking Environments

    Author : Daniel Granlund; Lars Wolf; Luleå tekniska universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Pervasive Mobile Computing; Distribuerade datorsystem;

    Abstract : Mobility support for users and devices, such as sensors, connecting to the Internet is a continuously growing trend. Different types of wireless networking technologies like WiFi, LTE, and ZigBee are available, creating a heterogeneous wireless networking environment. READ MORE

  4. 19. Digital Power of Attorney for authorization in industrial cyber-physical systems

    Author : Sreelakshmi Vattaparambil Sudarsan; Simone Fisher Hübner; Luleå tekniska universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyberfysiska system; Cyber-Physical Systems;

    Abstract : In the age of digitization, many Cyber-Physical Systems are semi-autonomous and have sufficient power and resources to perform tasks on behalf of users. This thesis defines an authorization technique to transfer the power of legitimate users to trusted CPS or IoT devices, allowing the device to sign or access resources on behalf of the user. READ MORE

  5. 20. Resource allocation for Mobile Edge Clouds

    Author : Amardeep Mehta; Erik Elmroth; Johan Tordsson; Valeria Cardellini; Umeå universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Mobile Edge Clouds; Edge Fog Computing; IoTs; Distributed Resource Allocation; datalogi; Computer Science; Computer Systems; datorteknik;

    Abstract : Recent advances in Internet technologies have led to the proliferation of new distributed applications in the transportation, healthcare, mining, security, and entertainment sectors. The emerging applications have characteristics such as being bandwidth-hungry, latency-critical, and applications with a user population contained within a limited geographical area, and require high availability, low jitter, and security. READ MORE