Essays about: "IPS"
Showing result 16 - 20 of 99 essays containing the word IPS.
-
16. Grandödens och andra faktorers effekt på aspens lavflora i Fiby urskog
University essay from SLU/Dept. of EcologyAbstract : Fiby urskog är sedan lång tid tillbaka känt för en stor biologisk mångfald med många hotade arter. Bland annat finns en intressant lavflora knuten till områdets gamla aspar. Under sommaren 2019 dog stora delar av områdets granar av granbarkborreangrepp. READ MORE
-
17. Energy efficient Ericsson Many-Core Architecture (EMCA) IP blocks for 5G ASIC
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Power consumption has become a leading concern for SoC aimed at 5G products that demand increased functionality, smaller form factors, and low energy footprint. For some EMCA IP blocks a hierarchical clock gating mechanism ensures coarse-grained power savings based on actual processing need but for many blocks this approach cannot be employed. READ MORE
-
18. Key success factors for turning a high technology startup into a commercial success: A case study of a semiconductor startup
University essay from Lunds universitet/ProduktionsekonomiAbstract : While there have been numerous research papers defining and discussing high technology startup success, there is a lack of unity what the recipe for success is. Due to lack of market orientation being one of the most common reasons for startup failure, combined with the essentiality of having a strong technology base in a high technology environment, there is an interest to study their intersection also due to confine previous research in this area. READ MORE
-
19. Research of methods and algorithms of insider detection in a computer network using machine learning technologies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE
-
20. Living off the Land Binaries with Virtual Machines
University essay from Högskolan i HalmstadAbstract : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). READ MORE