Essays about: "Defense technique"

Showing result 1 - 5 of 15 essays containing the words Defense technique.

  1. 1. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuechun Lu; [2023]
    Keywords : Missing data handling; Rough set reduction; FAVC Set; ID3; Saknade datahantering; Rough set reducering; FAVC Set; ID3;

    Abstract : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. READ MORE

  2. 2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  3. 3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Augustin Bariant; [2023]
    Keywords : Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Abstract : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. READ MORE

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 5. Visualizations in Augmented Reality for Multiple Real-Time Unmanned Aerial Vehicle Video Feeds : Visualizing Occluded and Out-of-View Entities

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Måns Bränneby; Oliver Gerfort; [2022]
    Keywords : Augmented reality; UAV; Visualization; Systematic literature review; Experiment; Augmenterad verklighet; UAV; Visualisering; Systematic literature review; Experiment;

    Abstract : Background. The use of Unmanned Aerial Vehicles (UAVs) is today prevalent in both defense applications as well as in civilian tasks and is predicted to have a major socio-economic impact [22]. READ MORE