Essays about: "Computer security issues"
Showing result 1 - 5 of 48 essays containing the words Computer security issues.
-
1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
2. Evaluating the Viability of Synthetic Pre-training Data for Face Recognition Using a CNN-Based Multiclass Classifier
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today, face recognition is becoming increasingly accurate and faster with deep learning methods such as convolutional neural networks (CNNs), and is now widely used in areas such as security and entertainment. Typically, these CNNs are trained using real-face datasets like CASIA-WebFace, which was put together using web-crawling of IMDB. READ MORE
-
3. Mapping Several NIS2 Directive Articles to Technical Specifications for the Healthcare Sector in Sweden
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Compliance with legal instruments is vital for the survival of any organization or company in the public and private sectors. Non-compliance may result in criminal and financial penalties that can have grave effects on the indicted institution. READ MORE
-
4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
5. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE