Essays about: "Resilient Information system"
Showing result 1 - 5 of 33 essays containing the words Resilient Information system.
-
1. Psychological well-being among international students in a Swedish university, a qualitative study
University essay from Högskolan i Halmstad/Akademin för hälsa och välfärdAbstract : Background: This study explores the psychological well-being of Asian international students in Sweden by identifying their sources of stress, coping strategies and resilient factors and their sources of support. The aim of this study is to have a deeper understanding of challenges for Asian international students during their study-time in Sweden to find more efficient ways to support them in the future. READ MORE
-
2. Detection of suicidal ideation in written communication
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Suicide remains a global cause of mortality, presenting challenges in detection and prevention despite known warning signs. This work aimed to improve personal security management by leveraging machine learning advancements to identify suicidal ideation in written communications. READ MORE
-
3. A Game-theoretical Framework for Byzantine-Robust Federated Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE
-
4. Secure Application Development
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE
-
5. Puzzle-based Clogging DoS-resilient Vehicular Communications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In Vehicular Communication Systems (VCSs), authenticated safety beacons are used to deliver the vehicles’ status and provide necessary information for the applications. However, high rate safety beacons impose high processing overhead on the resource-constrained vehicular On-Board Units (OBUs). READ MORE