Essays about: "Key message"

Showing result 1 - 5 of 121 essays containing the words Key message.

  1. 1. Towards Automated Log Message Embeddings for Anomaly Detection

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Adrian Murphy; Daniel Larsson; [2024]
    Keywords : Technology and Engineering;

    Abstract : Log messages are implemented by developers to record important runtime information about a system. For that reason, system logs can provide insight into the state and health of a system and potentially be used to anticipate and discover errors. READ MORE

  2. 2. Risk & Policy: The relevance and influence of Aaron Wildavsky’s book Searching for Safety in the safety discourse.

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Hans Nagtegaal; [2024]
    Keywords : Wildavsky; Resilience; Anticipation; Cultural Theory; Global Safety; Political Science; Safety Discourse; Social Power; Economy of Safety; Net Benefit; FLMU06; Technology and Engineering;

    Abstract : The main finding of this thesis is that the relevance and influence of Aaron Wildavsky’s book Searching for Safety in today’s safety discourse is limited although Wildavsky may be considered to be the linking pin between RE, HRO and NAT. The safety discourse may benefit from Wildavsky’s work in political science: I.e. READ MORE

  3. 3. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers

    University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteori

    Author : Filip Fornmark; [2023-01-19]
    Keywords : statistical language models; cryptanalysis; historical cryptology; homophonic substitution;

    Abstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE

  4. 4. Evaluation and Optimization of LTE-V2X Mode 4 under Aperiodic Messages of Variable Size

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Md Mamunur Rashid; [2023]
    Keywords : LTE-V2X; aperiodic; variable size; CAM; Technology and Engineering;

    Abstract : Vehicular networks connect vehicles for improved road safety and efficiency with the assistance of wireless information exchange. Vehicular networks are based on the frequent broadcast of awareness messages referred to as CAM (Cooperative Awareness Messages) or BSM (Basic Safety Message) in the ETSI and SAE standards, respectively. READ MORE

  5. 5. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE