Essays about: "Flow Security"

Showing result 11 - 15 of 145 essays containing the words Flow Security.

  1. 11. The Arab Spring, the rise of terrorism in the Sahel and the evolution of peace and counterterrorism operations in the region : A case study of Mali and neighbouring countries and how peace and counterterrorism operations adjusted to the rise of terrorism in the region

    University essay from Uppsala universitet/Teologiska institutionen

    Author : Maria Maio; [2023]
    Keywords : terrorism; Arab Spring; Sahel; failed states; ungoverned spaces; peace and counterterrorism operations; war on terror; development-security nexuss;

    Abstract : The Arab Spring led to the overthrow of multiple authoritarian regimes in the Middle East and North Africa and to the flow of arms and fighters from Libya to Western African countries, triggering the crisis in the Sahel and altering the security landscape of the region. The Sahel, a quite stable region, became vulnerable to the rise of terrorism due to political instability, internal conflicts dynamics and power vacuum which led to ungoverned spaces to be seen as safe havens to terrorist groups. READ MORE

  2. 12. Passenger flow prediction : Finding and developing a sustainable machine learning model for airport passenger flow prediction

    University essay from Uppsala universitet/Matematiska institutionen

    Author : Tomas Haglund; Oskar Jonsson; [2023]
    Keywords : Maskininlärning flyplats flyg flygindustrin passanger flow AI;

    Abstract : There are many outdated routines and processes in today's aviation industry that major airlines lack the motivation to update. While this may not hold any direct security concerns, it creates bottlenecks at checks and high salary costs for otiose airport personnel. READ MORE

  3. 13. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  4. 14. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  5. 15. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE