Essays about: "External Threats"

Showing result 21 - 25 of 101 essays containing the words External Threats.

  1. 21. Robust naval localization using a particle filter on polar amplitude gridmaps

    University essay from KTH/Optimeringslära och systemteori

    Author : Carl Schiller; [2021]
    Keywords : Amplitude gridmap; particle filter; position monitoring; marine navigation.; Amplitudrutnätskartor; partikelfilter; positionsestimering; marin navigation.;

    Abstract : Maritime navigation heaviliy relies on GNSS and related technologies for positioning and navigiation. Since these technologies are vulnerable to external threats such as signal spoofing, alternatives are needed for backup purposes. READ MORE

  2. 22. The Russians are Coming : A qualitative text analysis of external threat representation in official policy documents

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Maja Rudin; [2021]
    Keywords : Russia; external threat; qualitative; political science;

    Abstract : The purpose of this thesis is to elucidate which issues that are portrayed as external threats during a disarmament process versus an armament process in Sweden by studying two Defence Committee reports. To understand what is portrayed as external threats, an analysis of both reports and a comparison between them have been made. READ MORE

  3. 23. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  4. 24. How does othering in Abu Bakr Naji’s The Management of Savagery and Anders Breivik’s 2083 reveal what the two authors perceive as the main external threats to their own groups?

    University essay from Uppsala universitet/Teologiska institutionen

    Author : James Graeme Miles Whitehead; [2020]
    Keywords : Othering; others; terrorism; takfiri; far right; Abu Bakr Naji; Anders Breivik; Al Qaeda; ISIS; Cultural Marxists; jihad;

    Abstract : Othering is central in the rhetoric of both Abu Bakr Naji and Anders Breivik throughout their works. Both authors use it as a device to drive a psychological wedge between the groups of ‘us’ and ‘them’. READ MORE

  5. 25. Automated security analysis of a SCADA system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Akzharkyn Duisembiyeva; [2020]
    Keywords : threat modeling; DSL; MAL; cyber security; SCADA; hotmodellering; DSL; MAL; cybersäkerhet; SCADA;

    Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE