Essays about: "System loggar"

Showing result 1 - 5 of 26 essays containing the words System loggar.

  1. 1. Comparing machine learning algorithms for detecting behavioural anomalies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Fredrik Jansson; [2023]
    Keywords : Anomaly Detection; Machine Learning; Behavioural Anomalies;

    Abstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE

  2. 2. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Meyer; [2022]
    Keywords : Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE

  3. 3. Development and implementation of a data collection system for temperature and climatic test systems

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Marcus Sandell; [2022]
    Keywords : Raspberry Pi; Python; Vötsch; MySQL; Technology and Engineering;

    Abstract : A large part of developing products is the testing and validation of the new products. This process requires expensive test systems and a great deal of time and space. Because of these factors it is very important to maximize the usage of the test systems. READ MORE

  4. 4. Natural Language Processing Model for Log Analysis to Retrieve Solutions For Troubleshooting Processes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Núria Marzo i Grimalt; [2021]
    Keywords : Trouble Report; Recommender System; BERT; Information Retrieval; Natural Language Processing; Multi-Stage Ranking; Felrapporter; Rekommendatorsystem; BERT; Informationsinhämtning; Naturlig Språkbehandling; Dubbelriktade Ranking;

    Abstract : In the telecommunications industry, one of the most time-consuming tasks is troubleshooting and the resolution of Trouble Report (TR) tickets. This task involves the understanding of textual data which can be challenging due to its domain- and company-specific features. READ MORE

  5. 5. Evaluating and Automating a Scaled Agile Framework Maturity Model

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabienne Reitz; [2021]
    Keywords : Agile Maturity Models; Scaled Agile Development; SAFe; Process Mining; Automation; Agila Mognads Modeller; Uppskalad Agil Utveckling; SAFe; Process Mining; Automatisering;

    Abstract : While agile development is becoming ever more popular, studies have shown that few organisations successfully transition from traditional to agile practices. One such study showed that large organisations can benefit greatly from agile methods, but evaluating agile maturity and tailoring the method to the organisation’s needs is crucial. READ MORE