Search for dissertations about: "security service"
Showing result 21 - 25 of 137 swedish dissertations containing the words security service.
-
21. Internet services and security
Abstract : This thesis presents my research on IP Traceback and on QoS admission control. It also includes a brief discussion about the security problems we are facing today and how adding new network services affects the original Internet design. Internet security is an ever rising problem. READ MORE
-
22. Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation
Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. READ MORE
-
23. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods
Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. READ MORE
-
24. Balancing structure and flexibility in the ambulance service : the pursuit of professional judgement in caring and learning
Abstract : The overall aim of this thesis was to describe the conditions for learning inthe ambulance service during clinical practice, and to develop an understanding of how to support the professional development of caring in this context.The findings of this thesis are based on four qualitative interview studies. READ MORE
-
25. Design Principles for Network Distributed Denial of Service Defense
Abstract : People, organizations and society are become more and more dependent upon access to Information Systems. Most Information Systems are accessible via the Internet. It is becoming easier and easier to perform successful network attacks against these Information Systems, which causes the system to become unavailable for its intended users. READ MORE