Essays about: "Threat environment"
Showing result 16 - 20 of 379 essays containing the words Threat environment.
-
16. Sustainable Lighting Strategies for Nytorps Gärde. A Case Study
University essay from KTH/LjusdesignAbstract : This paper focuses on exterior lighting strategies for suburban green areas in Stockholm, using the Nytorps gärde case study as an example. The research methodology employed includes a literature review, a survey, quantitative measurements, and expert interviews. READ MORE
-
17. Confidential Federated Learning with Homomorphic Encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE
-
18. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE
-
19. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE
-
20. Behaviour-based detection ofransomware attacks in the Cloud usingmachine learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Ransomware attacks are a significant threat to digital informa-tion, and with the increasing adoption of cloud storage services, attackers now targetcloud environments. The existing literature on ransomware detection has primarilyfocused on local environments, and there is a limited body of research on applyingthese approaches to the cloud environment. READ MORE