Essays about: "Johan Hedlin"

Found 3 essays containing the words Johan Hedlin.

  1. 1. Optimisation of the gas atomisation process used in aluminium powder production : To improve morphology by minimising satellite formations

    University essay from KTH/Materialvetenskap

    Author : Henrik Hedlin; Johan Nymo; [2023]
    Keywords : ;

    Abstract : There exists a lack of information and an exact understanding of the gas atomisation process resulting in the use of trial and error methods in the industry. The lack of information is the result of the difficulties in observing the actual process as it occurs, something that the use of computational fluid dynamics may be able to substitute. READ MORE

  2. 2. Automating software installation for cyber security research and testing public exploits in CRATE

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Kahlström; Johan Hedlin; [2021]
    Keywords : cyber range; software installation; cyber security; CRATE; exploit testing; automation; cyberanläggning; mjukvaruinstallation; cybersäkerhet; CRATE; angreppstestning; automatisering;

    Abstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE

  3. 3. Detecting access to sensitive data in software extensions through static analysis

    University essay from Linköpings universitet/Programvara och system

    Author : Johan Hedlin; Joakim Kahlström; [2019]
    Keywords : static analysis; extensions; plugin; sensitive data; statisk analys; tillägg; känslig data;

    Abstract : Static analysis is a technique to automatically audit code without having to execute or manually read through it. It is highly effective and can scan large amounts of code or text very quickly. This thesis uses static analysis to find potential threats within a software's extension modules. READ MORE