Essays about: "Defense technique"
Showing result 1 - 5 of 15 essays containing the words Defense technique.
-
1. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. READ MORE
-
2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE
-
3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE
-
4. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
5. Visualizations in Augmented Reality for Multiple Real-Time Unmanned Aerial Vehicle Video Feeds : Visualizing Occluded and Out-of-View Entities
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The use of Unmanned Aerial Vehicles (UAVs) is today prevalent in both defense applications as well as in civilian tasks and is predicted to have a major socio-economic impact [22]. READ MORE