Essays about: "Application Isolation"

Showing result 1 - 5 of 61 essays containing the words Application Isolation.

  1. 1. Loneliness cannot be seen, but it can be talked about

    University essay from Lunds universitet/Sociologi

    Author : Heléne Schreber; [2023]
    Keywords : Migration; integration; health; social capital; Sweden; Social Sciences;

    Abstract : Studies and public health reports indicate that newly arrived refugees in Sweden experience poorer health and well-being compared to the general population, particularly among women. Research has also demonstrated that migrants' health not only starts off deprived upon arrival but also deteriorates over time. READ MORE

  2. 2. W2R: an ensemble Anomaly detection model inspired by language models for web application firewalls security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Zelong Wang; Athira AnilKumar; [2023]
    Keywords : web application firewall; anomaly detection; word2vec; BERT; dimension reduction; ensemble model;

    Abstract : Nowadays, web application attacks have increased tremendously due to the large number of users and applications. Thus, industries are paying more attention to using Web application Firewalls and improving their security which acts as a shield between the app and the internet by filtering and monitoring the HTTP traffic. READ MORE

  3. 3. Automating Root Cause Analysis of Anomalies in Ericsson Wallet Platform using Machine Learning

    University essay from Blekinge Tekniska Högskola

    Author : Simron Padhi; Devi Priya Battina; [2023]
    Keywords : Anomaly detection; Isolation forest algorithm; K-means algorithm; Local Outlier Factor algorithm; One class Support Vector Machine;

    Abstract : Background: In this era of mobile wallet platforms, to ensure key requirements like high availability and performance, the company must have mechanisms in place to detect anomalies at any given point in time. Ericsson Wallet Platform(EWP), a mobile wallet platform, is facing the problem of manually analyzing all the logs and reports and taking comprehensive action decisions accordingly. READ MORE

  4. 4. Deterministic Performance on Kubernetes

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Chetan Kandya; [2023]
    Keywords : Kubernetes; Deterministic Performance; Core Isolation; IDO; Intent Driven Orchestration; CRI-RM; Docker; Cloud Optimization;

    Abstract : With the exponential growth of virtualization and cloud computing over the last decade, many companies in the telecommunications sector have started their journey towards cloud migration by exchanging a lot of specialized hardware for virtualized solutions. With more and more applications running in a cloud environment, it became essential to run these applications on heterogeneous systems with shared underlying hardware and software resources. READ MORE

  5. 5. Advanced Electricity Meter Anomaly Detection : A Machine Learning Approach

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robin Svensson; Saleh Shalabi; [2023]
    Keywords : anomaly detection; isolation forest; autoencoder; smart electricity meters; unsupervised machine learning; electricity consumption;

    Abstract : The increasing volume of smart electricity meter readings presents a challenge forelectricity providing companies in accurately validating and correcting the associated data. This thesis attempts to find a possible solution through the application ofunsupervised machine learning for detection of anomalous readings. READ MORE