Search
Skip to Search Results- 15Computer security
- 4Internet of things
- 3Cloud computing
- 3Mobile communication systems
- 25G mobile communication systems
- 2Machine learning
- 5Kaur, Sandeep (Supervisor)
- 2MacGregor, Mike (Advisor)
- 2Noonari, Juned (Supervisor)
- 1Bhat, Shriya
- 1Dhayanidhi, Glory
- 1Kaur, Jaskiran
-
2022-03-26
Cyber security is an application of technologies that provides secured networks, protects data from unauthorized access, and makes resources available only to authorized personnel [1]. In today’s world, data is the new oil. The Internet plays a crucial role in data exchange, not just limited to...
-
2022-03-01
Abstract: Cryptocurrency has emerged as one of the widely used applications based on Blockchain. This report intends to provide an overview of Cryptocurrency, Blockchain, Cryptographic hashing, Public key encryption and Quantum computer subjects. The report will touch upon various technologies...
-
2022-02-28
Cybersecurity is the process or state of protecting programs, networks, and systems from any cyber-attack. These cyber-attacks are usually aimed at changing, accessing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. In an enterprise,...
-
2021-10-29
The risk of online personal information breaches is increasing as people put more critical data online., strong authentication protecting this information is not being adopted quickly enough to deal with the threat. Online security specialists recommend people should use two-factor authentication...
-
Design, Implementation, and Research on Security Vulnerabilities of Smart Water Meter Network
Download2022-03-22
The main objective of this project is to research on security vulnerabilities of smart water meter networks and choose the best communication technologies for SMW by comparing the existing technologies like LoRA and NB-IoT. Furthermore, we studied how massive IoT will be built on top of NB-IoT...
-
Spring 2011
We propose a novel approach for detecting visual similarity between two web pages. The proposed approach applies Gestalt theory and considers a webpage as a single indivisible entity. The concept of supersignals, as a realization of Gestalt principles, supports our contention that web pages must...
-
Detection and Prevention of Cybersecurity Risks of Cloud-connected Machinery in Industrial Internet of Things System (IIoT)
Download2022-03-09
Internet of Things (IoT) is the interconnection of physical devices, which are equipped with sensor to collect data, and management platforms to perform analysis on the data collected. IoT helps people to make decision or further control on other devices automatically. Industrial Internet of...
-
2019-03-09
According to AV-TEST Institute, there were around 7.12 million new malware registered in its database in December 2018, and the number continues to grow every single day. It has become an enormous threat to all the major organisations, smaller business as well as to an individual. To save a ...
-
2021-10-28
Transition to application virtualization is causing IT organizations to reconsider the methods it uses for deployment of services like IT support, application usage, management, etc. It is becoming important to have a vision for the application delivery methods for the future. Today the choice of...
-
Implementation Security, or a Language-theoretic Security Analysis of OpenFlow and What I Found There
Download2013-11-01
Implementation is the most immediate aspect of security in the construction of real-world distributed computing systems; designs have flaws but vulnerabilities themselves manifest in implementations. The challenge of securing systems during implementation is apparent from observing the computing...