Essays about: "NIST"

Showing result 1 - 5 of 38 essays containing the word NIST.

  1. 1. Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Thanintorn Thamrongthanakit; [2023]
    Keywords : SMEs in Thailand; Cybersecurity Frameworks; Cybersecurity Contols;

    Abstract : Small and medium enterprises (SMEs) are a significant factor that drives the global economy, especially in developing countries such as Thailand, where SMEs contribute more than one-third of the Thai GDP. With digital transformation allowing businesses to access new technologies easily, most SMEs have shifted from traditional businesses to digital businesses. READ MORE

  2. 2. Cybersecurity in home-office environments : An examination of security best practices post Covid

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Robin Klint; [2023]
    Keywords : ;

    Abstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE

  3. 3. Amplifying heap overflow vulnerability detection with reinforcement learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Erik Thomasson; Ludwig Wideskär; [2023]
    Keywords : ;

    Abstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE

  4. 4. Towards Automatic Model Atoms from the VALD Atomic Database: from He to U

    University essay from Uppsala universitet/Teoretisk astrofysik

    Author : Samuel Hermansson; [2023]
    Keywords : r-process; nucleosynthesis; kilonovae; VALD;

    Abstract : The ejecta following the collision and merging of two neutron stars (kilonova) are currently considered promising sites for nucleosynthesis of r-process elements. Since the observed kilonova in 2017, GW2017817, astrophysicists have been working to analyze the collected electromagnetic spectra, trying to identify r-process elements. READ MORE

  5. 5. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE