Essays about: "Key message"
Showing result 1 - 5 of 121 essays containing the words Key message.
-
1. Towards Automated Log Message Embeddings for Anomaly Detection
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Log messages are implemented by developers to record important runtime information about a system. For that reason, system logs can provide insight into the state and health of a system and potentially be used to anticipate and discover errors. READ MORE
-
2. Risk & Policy: The relevance and influence of Aaron Wildavsky’s book Searching for Safety in the safety discourse.
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : The main finding of this thesis is that the relevance and influence of Aaron Wildavsky’s book Searching for Safety in today’s safety discourse is limited although Wildavsky may be considered to be the linking pin between RE, HRO and NAT. The safety discourse may benefit from Wildavsky’s work in political science: I.e. READ MORE
-
3. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers
University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteoriAbstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE
-
4. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE
-
5. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE