Essays about: "Defense and technology"
Showing result 16 - 20 of 137 essays containing the words Defense and technology.
-
16. Strategies of Honeypot Placement in Cyberspace
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE
-
17. Simulation of Quantum Cascade Lasers
University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Matematisk fysikAbstract : This thesis aimed to contribute to the improvement of Quantum Cascade Lasers (QCLs) by focusing on the effective determination of quantum levels in these devices. The current method relies on an outdated Fortran code, which poses challenges when integrating into optimization schemes. READ MORE
-
18. Contract Models for Increased Total Value Creation in Combat Aircraft Programs : A Case Study of Saab AB Aeronautics and FMV
University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utvecklingAbstract : Combat aircraft programs between a manufacturer and government are critical for both parties, asit involves significant costs, lengthy development times, and high risks. If successful, suchprograms can result in improved defense capabilities for the government and financial gains forthe manufacturer. READ MORE
-
19. Tracing Systematic Factors of Lead Time Deviations : A Case Study of Large-Scale Custom-Driven Development Projects at Saab Surveillance
University essay from Uppsala universitet/Industriell teknikAbstract : In a world driven by technological advancements and ever-changing consumer preferences, large-scale custom-driven development projects have emerged as the gateway to creating complex products and systems tailored to individual customer needs. Steering these projects to successful completion presents significant challenges, with lead time deviations being a key concern. READ MORE
-
20. Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. READ MORE