Essays about: "deceptive detection"

Found 4 essays containing the words deceptive detection.

  1. 1. Evaluation of FMCW Radar Jamming Sensitivity

    University essay from Uppsala universitet/Signaler och system

    Author : Ludvig Snihs; [2023]
    Keywords : FMCW; FMCW radar; radar; frequency-modulated radar; noise jamming; frequency-modulated continuous wave radar; FMCW Jamming; Jamming; Pulse Train; Pulse Jamming; Spoofing Attack; Spoofing; Deception; Repeater Jamming; Repeater; Automotive Radar; CFAR; sensor jamming; constant false alarm rate; electronic warfare; EW; FMCW; FMCW radar; frekvensmodulerad dopplerradar; dopplerradar; radar; brusstörning; radarstörning; pulsstörning; pulståg; falskmål; vilseledning; repeterstörning; bilradar; sensorstörning; CFAR;

    Abstract : In this work, the interference sensitivity of an FMCW radar has been evaluated by studying the impact on a simulated detection chain. A commercially available FMCW radar was first characterized and its properties then laid the foundation for a simulation model implemented in Matlab. READ MORE

  2. 2. Estimating the risk of insurance fraud based on tonal analysis

    University essay from Lunds universitet/Matematisk statistik

    Author : Henrik Steneld; [2022]
    Keywords : Spectral analysis; Speaker recognition; Tonal analysis; Speaker Diarization; Machine Learning; LSTM; ResNet; Fraud detection; Mathematics and Statistics;

    Abstract : Insurance companies utilize various methods for identifying claims that are of potential fraudulent nature. With the ever progressing field of artificial intelligence and machine learning models, great interest can be found within the industry to evaluate the use of new methods that may arise as a result of new advanced models in combination with the rich data that is being gathered. READ MORE

  3. 3. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE

  4. 4. Detection of deceptive reviews : using classification and natural language processing features

    University essay from Uppsala universitet/Institutionen för teknikvetenskaper

    Author : Johan Fernquist; [2016]
    Keywords : Machine learning; deceptive detection; SVM; support vector machines; natural language processing; NLP; classification;

    Abstract : With the great growth of open forums online where anyone can givetheir opinion on everything, the Internet has become a place wherepeople are trying to mislead others. By assuming that there is acorrelation between a deceptive text's purpose and the way to writethe text, our goal with this thesis was to develop a model fordetecting these fake texts by taking advantage of this correlation. READ MORE