Essays about: "Threat environment"

Showing result 16 - 20 of 379 essays containing the words Threat environment.

  1. 16. Sustainable Lighting Strategies for Nytorps Gärde. A Case Study

    University essay from KTH/Ljusdesign

    Author : Joseph Hutt; [2023]
    Keywords : Perceived safety; darkness; sustainability; light pollution; suburban park; lighting strategy;

    Abstract : This paper focuses on exterior lighting strategies for suburban green areas in Stockholm, using the Nytorps gärde case study as an example. The research methodology employed includes a literature review, a survey, quantitative measurements, and expert interviews. READ MORE

  2. 17. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  3. 18. Insider Threat For Service Account in Google Cloud Platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ravikiran Talekar; [2023]
    Keywords : ;

    Abstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE

  4. 19. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  5. 20. Behaviour-based detection ofransomware attacks in the Cloud usingmachine learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yaroslav Popryho; Leonid Popryho; [2023]
    Keywords : ransomware detection; cloud environments; behavior-based detec- tion; machine learning; Google Drive;

    Abstract : Background: Ransomware attacks are a significant threat to digital informa-tion, and with the increasing adoption of cloud storage services, attackers now targetcloud environments. The existing literature on ransomware detection has primarilyfocused on local environments, and there is a limited body of research on applyingthese approaches to the cloud environment. READ MORE