Essays about: "Datorsystem"

Showing result 1 - 5 of 91 essays containing the word Datorsystem.

  1. 1. Threat modeling of large-scale computer systems : Implementing and evaluating threat modeling at Company X

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Love Wessman; Niklas Wessman; [2020]
    Keywords : ;

    Abstract : Threat modeling is a growing field in cyber security. As computer systems grow larger and more complicated, the understanding of how to model and protect these systems becomes ever more important. Threat modeling is a method well suited for this task. READ MORE

  2. 2. Extracting Behaviour Trees from Deep Q-Networks : Using learning from demostration to transfer knowledge between models.

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : Zacharias Nordström; [2020]
    Keywords : Behaviour tree; deep q-network; extraction;

    Abstract : In recent years the advancement in machine learning have solved more and more complex problems. But still these techniques are not commonly used in the industry. One problem is that many of the techniques are black boxes, it is hard to analyse them to make sure that their behaviour is safe. READ MORE

  3. 3. Managing Microservices with a Service Mesh : An implementation of a service mesh with Kubernetes and Istio

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ronja Mara Jösch; [2020]
    Keywords : Service mesh; Istio; Kubernetes; Microservices; Microservice Architecture; Cloud Computing; cloud-native;

    Abstract : The adoption of microservices facilitates extending computer systems in size, complexity, and distribution. Alongside their benefits, they introduce the possibility of partial failures. READ MORE

  4. 4. Automated security analysis of a SCADA system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Akzharkyn Duisembiyeva; [2020]
    Keywords : threat modeling; DSL; MAL; cyber security; SCADA; hotmodellering; DSL; MAL; cybersäkerhet; SCADA;

    Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE

  5. 5. Multilingual identification of offensive content in social media

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : Marc Pàmies Massip; [2020]
    Keywords : offensive language; hate speech; twitter; social media; nlp; ai; natural language processing; artificial intelligence; machine learning; bert; text classification;

    Abstract : In today’s society there is a large number of social media users that are free to express their opinion on shared platforms. The socio-cultural differences between the people behind those accounts (in terms of ethnicity, gender, sexual orientation, religion, politics, . . . READ MORE