Essays about: "Cloud detection"
Showing result 1 - 5 of 139 essays containing the words Cloud detection.
-
1. Log Frequency Analysis for Anomaly Detection in Cloud Environments
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE
-
2. N-body simulations of exoplanets and their moons
University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionenAbstract : The planet-planet interactions in a many-planet system cannot be analytically calculated. Instead, they have to be investigated by using an N-body simulation. I discuss three questions about the N-body interactions in planetary systems: The first two are on the system 55 Cnc, a system with five known planets around a K-type star. READ MORE
-
3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
4. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE
-
5. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE