Essays about: "NSL"
Found 5 essays containing the word NSL.
-
1. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE
-
2. Stability after Mandibular Advancement using Bilateral Sagittal Split Osteotomy
University essay from Umeå universitet/Institutionen för odontologiAbstract : The bilateral sagittal split osteotomy (BSSO) of the mandible is performed to improve function and aesthetics if skeletal discrepancy between dental arches are severe. The aim of this retrospective study was to evaluate skeletal stability after surgical advancement of the mandible with BSSO. READ MORE
-
3. Protection of Personal Data, a Power Struggle between the EU and the US: What implications might be facing the transfer of personal data from the EU to the US after the CJEU’s Safe Harbour ruling?
University essay from Uppsala universitet/Juridiska institutionenAbstract : Since the US National Security Agency’s former contractor Edward Snowden exposed the Agency’s mass surveillance, the EU has been making a series of attempts toward a more safeguarded and stricter path concerning its data privacy protection. On 8 April 2014, the Court of Justice of the European Union (the CJEU) invalidated the EU Data Retention Directive 2006/24/EC on the basis of incompatibility with the Charter of Fundamental Rights of the European Union (the Charter). READ MORE
-
4. Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : Data mining can be defined as the extraction of implicit, previously un-known, and potentially useful information from data. Numerous re-searchers have been developing security technology and exploring new methods to detect cyber-attacks with the DARPA 1998 dataset for Intrusion Detection and the modified versions of this dataset KDDCup99 and NSL-KDD, but until now no one have examined the performance of the Top 10 data mining algorithms selected by experts in data mining. READ MORE
-
5. Quality Assessment of Spatial Data: Positional Uncertainties of the National Shoreline Data of Sweden
University essay from Högskolan i Gävle/Avdelningen för Industriell utveckling, IT och SamhällsbyggnadAbstract : This study investigates on the planimetric (x, y) positional accuracy of the National Shoreline (NSL) data, produced in collaboration between the Swedish mapping agency Lantmäteriet and the Swedish Maritime Administration (SMA). Due to the compound nature of shorelines, such data is afflicted by substantial positional uncertainties. READ MORE