Essays about: "EST."

Showing result 1 - 5 of 114 essays containing the word EST..

  1. 1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  2. 2. Calibration and preparation of the data analysis of the DORN experiment on board the Chang'E 6 lunar mission.

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Íñigo de Loyola Chacartegui Rojo; [2023]
    Keywords : Radon; lunar mission; alpha spectrometry; space instrumentation; performance testing and validation;

    Abstract : As part of the first agreement between the French (CNES) and the Chinese (CNSA) space agencies in terms of space exploration, the DORN instrument will fly on board the Chinese Chang'E 6 mission in 2024. It aims to measure the amount of Radon escaping from the lunar soil to better understand what governs the concentration of this noble gas which contributes to the endogenous origin of the lunar exosphere. READ MORE

  3. 3. Embodying the transformation: An exploration of the role of art-based approaches in achieving a just and sustainable city through citizen participation in Malmö

    University essay from Lunds universitet/LUCSUS

    Author : Rabea Sorka Sophie Tzschabran; [2023]
    Keywords : sustainability science; creative placemaking; experiential learning; inner transformation; Social Sciences;

    Abstract : The exposure of societies to climate change requires cities to adequately respond to increasing environmental pressures while ensuring the well-being of citizens. Here, sustainable urban planning is an important tool. READ MORE

  4. 4. Investigating fungicide resistance of Alternaria solani, a Solanaceae pathogen, on potato crops in south-eastern Sweden and its relationship with soil

    University essay from SLU/Dept. of Plant Protection Biology

    Author : Emma Lefèvre; [2023]
    Keywords : Alternaria solani; fungicide resistance; Fluopyram; mycelial growth; type of soil; soil conditions;

    Abstract : Alternaria solani is a worldwide present fungus that can cause a lot of damage such as early blight in potato crops. Potato can suffer a lot of yield losses because of this pathogen, and the main method used today to fight against it, is the application of fungicides. READ MORE

  5. 5. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE