Essays about: "Cloud detection"

Showing result 1 - 5 of 139 essays containing the words Cloud detection.

  1. 1. Log Frequency Analysis for Anomaly Detection in Cloud Environments

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Prathyusha Bendapudi; [2024]
    Keywords : Log Analysis; Log Frequency Patterns; anomaly detection; machine learning; cloud environments;

    Abstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE

  2. 2. N-body simulations of exoplanets and their moons

    University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionen

    Author : Lydia Schollmeier; [2024]
    Keywords : Physics and Astronomy;

    Abstract : The planet-planet interactions in a many-planet system cannot be analytically calculated. Instead, they have to be investigated by using an N-body simulation. I discuss three questions about the N-body interactions in planetary systems: The first two are on the system 55 Cnc, a system with five known planets around a K-type star. READ MORE

  3. 3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  4. 4. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE

  5. 5. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE