Essays about: "Computer System Security"
Showing result 1 - 5 of 184 essays containing the words Computer System Security.
-
1. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE
-
2. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE
-
3. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE
-
4. Effects of Energy Performance Improving Measures on a 1990's Brick House in Southern Czech Republic : Computer Simulations using IDA-ICE
University essay from Högskolan i Gävle/Energisystem och byggnadsteknikAbstract : The residential sector was responsible for 25% of the Final Energy Demand (FED) in the European Union in 2015. Countries in Central and Eastern Europe such as the Czech Republic are particularly concerned with ensuring security of supply at the lowest possible cost in recent years. READ MORE
-
5. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE