Essays about: "Missbruk"

Showing result 1 - 5 of 45 essays containing the word Missbruk.

  1. 1. SELF-INDUCED TEMPORARY INSANITY AND DRUG ABUSE : COURT PRACTICE AND THE CURRENT SOCIOLOGY OF PUNISHMENT

    University essay from Malmö universitet/Institutionen för kriminologi (KR)

    Author : Jeanette Rosenblom Petersson; [2023]
    Keywords : Addiction; Courts of Appeals; Self-induced temporary insanity. Severe Mental Disorder; Sociology of Punishment; Missbruk; Hovrätten; Självförvållad tillfällig sinnesförvirring; Allvarlig psykisk störning; Straffets sociologi;

    Abstract : Background: The Swedish penal code has viewed self-induced temporary insanity, caused by intoxication, depending on which Sociology of Punishment is currently active. Starting from a lenient view of drug-induced insanity in the Middle Ages towards a harsher penal climate today. READ MORE

  2. 2. Remedying mergers and acquisitions below the EUMR jurisdictional thresholds - The EU competition law treatment of non-reportable M&A transactions

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Samuel Hertsberg Åsander; [2023]
    Keywords : EU law; Competition law; Remedies; EUMR; jurisdictional thresholds; merger control; Article 102 TFEU; EU-rätt; konkurrensrätt; företagskoncentration; Law and Political Science;

    Abstract : Europeiska kommissionen har sedan en tid tillbaka upplevt brister i EU:s kontroll av företagskoncentrationer. Detta eftersom EU:s koncentrationsförordning inte anses fånga alla potentiellt konkurrensrättsligt problematiska företagsförvärv. READ MORE

  3. 3. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  4. 4. Ne Bis In Idem in EU Competition Law – The Application of the Principle on the Relationship Between Article 102 TFEU and the Digital Markets Act

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Emilia Holmberg; [2023]
    Keywords : EU law; Competition law; Article 102 TFEU; Digital Markets Act; DMA; Fundamental rights; Ne bis in idem; Law and Political Science;

    Abstract : During and after the adoption of the Digital Markets Act (DMA), concerns have been raised regarding the regulation’s relationship with the prohibition on abuse of dominant position in Article 102 TFEU. One possible concern regards the principle of ne bis in idem. The DMA is to be applied without prejudice to Article 102 TFEU. READ MORE

  5. 5. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pojan Shahrivar; [2022]
    Keywords : Vulnerability Scanning; Random Forest; Web application security; Next-Gen Web application Firewall; Machine learning; Dynamic application security testing; Intrusion detection prevention;

    Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE