Essays about: "computer information security"

Showing result 1 - 5 of 133 essays containing the words computer information security.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. OpenCourse: Gamification in Computer Science Education

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustaf Bodin; Elias Ekroth; Tobias Engblom; Filip Linde; Anwarr Shiervani; [2023-03-03]
    Keywords : Gamification; Education; Heuristic Evaluation; Desktop Application Development; Spelifiering; Utbildning; Heuristisk Utvärdering; Datorapplikationsutveckling;

    Abstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE

  3. 3. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  4. 4. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Iyad Al Khatib; [2023]
    Keywords : ;

    Abstract : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. READ MORE

  5. 5. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE