Essays about: "attacks"
Showing result 1 - 5 of 1127 essays containing the word attacks.
-
1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE
-
2. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving a noticeable gap in FL research specifically for regression models. READ MORE
-
3. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving a noticeable gap in FL research specifically for regression models. READ MORE
-
4. Förekomst av snöskytte i hyggesfria metoden schackrutehuggning i Västerbotten
University essay from SLU/School for Forest ManagementAbstract : Skogen är och har länge varit en viktig resurs för länet Västerbotten och den står för cirka 14 procent av den produktiva skogsmarksarealen i Sverige. Skogen i Västerbotten har brukats sedan medeltiden från småskaligt hushållsbehov till storskaligt skogsbruk i modern tid. READ MORE
-
5. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE