Essays about: "Malicious"

Showing result 21 - 25 of 257 essays containing the word Malicious.

  1. 21. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ajdin Buljubasic; [2023]
    Keywords : Bachelor Thesis; Drones; Communication; Security; Högskoleingenjör examensarbete; Drönare; Kommunikation; Säkerhet;

    Abstract : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. READ MORE

  2. 22. CarGo : A Decentralized Protocol for Booking and Payment in Car-Sharing Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Aristotelis-Antonios Kotsias; [2023]
    Keywords : blockchain; car-sharing system; layer two solutions; smart contract; car booking and payment;

    Abstract : Sharing commodities such as vehicles and houses in exchange for a fee has become very popular in the recent years. Companies such as Uber and Airbnb are two examples where their users can rent their underutilized assets for a period of time. READ MORE

  3. 23. Evaluation of machine learning models for classifying malicious URLs

    University essay from Högskolan i Gävle/Datavetenskap

    Author : Shayan Abad; Hassan Gholamy; [2023]
    Keywords : Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Abstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE

  4. 24. Deepfake detection by humans : Face swap versus lip sync

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Isak Sundström; [2023]
    Keywords : Deepfakes; Face swap; Lip sync; User study; Deepfakes; Face swap; Lip sync; Användarstudie;

    Abstract : The term “deepfakes” refers to media content that has been manipulated using deep learning. This thesis project seeks to answer the question of how well humans are able to detect deepfakes. In particular, the project compares people’s ability to detect deepfakes between two different deepfake categories; face swap and lip sync. READ MORE

  5. 25. Fault Tolerant Stabilizability in Multihop Control Networks

    University essay from Uppsala universitet/Avdelningen för systemteknik

    Author : Rana Faheem Iftikhar; [2023]
    Keywords : wireless networked control systems; Fault detection and isolation; Multihop control networks; WirelessHART; IT security; relay nodes failure; Design Wireless sensor network;

    Abstract : The integration of control systems with wireless communication networks has gainedsignificant popularity, leading to the emergence of wireless networked control systems(WNCS). WNCS comprises wireless devices such as sensors, actuators, andcontrollers that work together to ensure system stabilizability. READ MORE