Essays about: "Detection rule"
Showing result 21 - 25 of 51 essays containing the words Detection rule.
-
21. A Real- time Log Correlation System for Security Information and Event Management
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. READ MORE
-
22. Extracting Information From PDF Invoices Using Deep Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Manually extracting information from invoices can be time-consuming, especially when managing large amounts of documents. Finding a way to automatically extract this information could help businesses save resources. READ MORE
-
23. Cleartext detection and language identification in ciphers
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : In historical cryptology, cleartext represents text written in a known language ina cipher (a hand-written manuscript aiming at hiding the content of a message).Cleartext can give us an historical interpretation and contextualisation of themanuscript and could help researchers in cryptanalysis, but to these days thereis still no research on how to automatically detect cleartext and identifying itslanguage. READ MORE
-
24. Geo-temporal Online Analysis of Traffic Rule Violations
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Due to inattention and not complying with traffic regulations, human error accounts for roughly 94% of all traffic accidents. To counter this, the need to develop systems that can identify traffic rule violations and calculate the risk of collisions. The information reported can then be used to implement preventive measures. READ MORE
-
25. A cheat detection system for an educational pentesting cyber range: an intrusion deficit approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In academic courses, effort is given to detect and deal with plagiarism. Examplesof traditional plagiarism detection techniques include comparison of submittedhomework or supervised exams. Such techniques, however, are limitedin application to traditional teaching methods. READ MORE