Essays about: "Flow Security"
Showing result 11 - 15 of 145 essays containing the words Flow Security.
-
11. The Arab Spring, the rise of terrorism in the Sahel and the evolution of peace and counterterrorism operations in the region : A case study of Mali and neighbouring countries and how peace and counterterrorism operations adjusted to the rise of terrorism in the region
University essay from Uppsala universitet/Teologiska institutionenAbstract : The Arab Spring led to the overthrow of multiple authoritarian regimes in the Middle East and North Africa and to the flow of arms and fighters from Libya to Western African countries, triggering the crisis in the Sahel and altering the security landscape of the region. The Sahel, a quite stable region, became vulnerable to the rise of terrorism due to political instability, internal conflicts dynamics and power vacuum which led to ungoverned spaces to be seen as safe havens to terrorist groups. READ MORE
-
12. Passenger flow prediction : Finding and developing a sustainable machine learning model for airport passenger flow prediction
University essay from Uppsala universitet/Matematiska institutionenAbstract : There are many outdated routines and processes in today's aviation industry that major airlines lack the motivation to update. While this may not hold any direct security concerns, it creates bottlenecks at checks and high salary costs for otiose airport personnel. READ MORE
-
13. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
14. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE
-
15. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE