Essays about: "Direct attack"

Showing result 1 - 5 of 29 essays containing the words Direct attack.

  1. 1. Spridning av mjöldryga genom renkavle

    University essay from SLU/Dept. of Crop Production Ecology

    Author : Hugo Lomander; [2023]
    Keywords : Alopecurus myosuroides Huds; Claviceps purpurea Tul; gräs; gräsblandningar; gräskanter; höstsådd; höstvete; kantzoner; klimat; väder;

    Abstract : Mjöldryga (Claviceps purpurea Tul.) är en svampsjukdom som leder till stora skador på framför allt råg och vete. Den är vanligt förekommande i Europa och befaras öka i framtiden. Renkavle (Alopecurus myosuroides Huds. READ MORE

  2. 2. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE

  3. 3. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  4. 4. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  5. 5. Methods for Co-Orbital Threat Assessment in Space

    University essay from KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanik

    Author : Mathias Dahlman; [2023]
    Keywords : threats in space; threat assessment; Lambert s problem; genetic algorithms; NSGA-II; space surveillance and tracking capabilities; hot i rymden; hotbedömning; Lamberts problem; genetiska algoritmer; NSGA-II; inmätning och övervakning av rymdobjekt;

    Abstract : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. READ MORE