Essays about: "thesis on attacks"
Showing result 1 - 5 of 475 essays containing the words thesis on attacks.
-
1. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving a noticeable gap in FL research specifically for regression models. READ MORE
-
2. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving a noticeable gap in FL research specifically for regression models. READ MORE
-
3. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
4. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
5. Ensuring the Security of PyPI Packages
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE