Advanced search

Showing result 1 - 5 of 43 essays matching the above criteria.

  1. 1. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  2. 2. Att se det som inte ska synas : Vilka utmaningar står livsmedelsinspektörer inom den kommunala kontrollverksamheten inför när det kommer till att upptäcka bedrägligt och vilseledande ageranden utifrån de lagar och föreskrifter som finns

    University essay from SLU/Dept. of Energy and Technology

    Author : Staffan Mattias Paulsson; [2023]
    Keywords : livsmedelsbedrägeri; livsmedelsfusk; bedrägligt och vilseledande förfarande;

    Abstract : I alla tider har det funnits förekomster av bedrägerier inom livsmedelssektorn, och de främsta incitamenten är oftast av ekonomisk natur. Det är ett allvarligt problem eftersom trovärdigheten för våra livsmedel blir missbrukad och det kan leda till negativa konsekvenser för konsumenternas hälsa. READ MORE

  3. 3. The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Osama Abdulhadi; [2023]
    Keywords : Communication; compliance; development; effectiveness; government agencies; human factor; information security; information security awareness; information security culture; information security management system; information security policy; insider threat;

    Abstract : The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. READ MORE

  4. 4. Policy and regulation options for new and emerging offshore wind markets

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Inês Mendes Letra; [2023]
    Keywords : ;

    Abstract : This thesis addresses the need for policy and regulatory frameworks to support the sustainable growth of the offshore wind industry in new and emerging markets. The global need for clean and renewable energy is driving the emergence of offshore wind energy as a viable solution to achieve net-zero emissions goals. READ MORE

  5. 5. From Cubicles to Collaboration : A study on the Transformation of Government Office Spaces Driven by Cost-Efficiency, Digitalization, and Modernization

    University essay from KTH/Fastighetsföretagande och finansiella system

    Author : Sara Ghaemi Flores; [2023]
    Keywords : Authorities premises; The Principal-Agent theory; New Institutional Organization theory; Activity-Based Offices; Myndigheters lokaler; Principal-Agentteori; Teorin om nya instituionella organisationer; Aktivitetsbaserade kontor;

    Abstract : Over time, the office spaces of authorities have evolved, with external influences like pandemics accelerating the transition towards flexible, activity-based workplaces. Despite resistance, attitudes are slowly becoming positive towards modern, adaptable offices. READ MORE