Essays about: "IT security hypothesis"

Showing result 1 - 5 of 46 essays containing the words IT security hypothesis.

  1. 1. European Union Membership: A Blockade for Arms Dealers? : A qualitative analysis of the membership's effect on the illicit trade of Small Arms and Light Weapons

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Beata Lampers; [2023]
    Keywords : ;

    Abstract : This paper empirically examines the relationship between the European Union (EU) membership and its effect on the level of illicit trade of Small Arms and Light Weapons. Researchers have emphasised cooperation with the EU and similar organisations as a key to reducing the illicit trade in arms. READ MORE

  2. 2. Asset Pricing in Different Periods of Stock Market Volatility : The Varied Effectiveness of Carhart's Four-Factor Model in the Swedish Market

    University essay from Umeå universitet/Företagsekonomi

    Author : Robin Munkhammar; Svensson Hampus; [2023]
    Keywords : Capital Asset Pricing Models; Carhart Four-Factor Model; Swedish Stock Market Volatility;

    Abstract : Investing in the Swedish stock market has over time proven to be an effective way to increase wealth. Nationally speaking, Sweden’s population is also one of the best in the world at investing their savings. Four out of five swedes invest at least some part of their private savings into mutual funds which approximately amounts to 8. READ MORE

  3. 3. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pojan Shahrivar; [2022]
    Keywords : Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE

  4. 4. Towards Climate Resilient Peace: An Assessment of Climate Change Funding’s in Colombia

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Tània Ferré Garcia; [2022]
    Keywords : ecological security; environmental peacebuilding; climate adaptation; climate finance; Colombia;

    Abstract : A growing body of scholarship has explored the link between climate change, natural resources and conflict. While considerable interest has been shown in examining how and under what circumstances climate change may increase a country’s risks of conflict, research exploring climate change response initiatives in fragile and conflict-affected contexts remains limited. READ MORE

  5. 5. Climate Change and Positive Peace - A Study on the Effects of Rapid-Onset Climate Change on Positive Peace

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Kristiane Patt; [2022]
    Keywords : Climate Change; Natural Disasters; Positive Peace;

    Abstract : While it has often been argued to be connected, the climate-peace nexus is still understudied. Multiple reasons are underlying this, such as that the focus has been solely on the effects of climate change on negative peace and that a clear definition of what peace consists of is non-existent. READ MORE