Essays about: "Object Security"

Showing result 6 - 10 of 94 essays containing the words Object Security.

  1. 6. PTZ Handover: Tracking an object across multiple surveillance cameras

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Alexander Persson; [2023]
    Keywords : Technology and Engineering;

    Abstract : Tracking objects in a scene is a crucial task in accomplishing surveillance that enhances security and provides valuable information about the events happening at the site. For this task, the PTZ (pan-tilt-zoom) cameras can be utilized to achieve fluid tracking as they provide all-around surveillance with zoom capabilities. READ MORE

  2. 7. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Engla Jansson; [2023]
    Keywords : ;

    Abstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE

  3. 8. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  4. 9. Grindvakten

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Niclas Anneling; [2023]
    Keywords : NATO; Sweden and Finland; Türkiye; Established-Outsider; Gatekeeper; Law and Political Science;

    Abstract : During the NATO application process for Sweden and Finland, Türkiye has halted the rapid pace of member states ratification through a set of conditions. This thesis’ aim is to examine the mechanisms behind the gatekeeping position upheld by Türkiye. READ MORE

  5. 10. Quality Control: Detect Visual Defects on Products Using Image Processing and Deep Learning

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Isac Pettersson; Johan Skäremo; [2023]
    Keywords : Computer vision; Deep learning; image processing; Defect detection; Small object detection;

    Abstract : Computer vision, a prominent subfield of artificial intelligence, has gained widespread util-ization in diverse domains such as surveillance, security, and robotics. This research en-deavors to develop an semi-automated defect detection system serving as a quality controlassurance mechanism for Nolato MediTor, a manufacturing company within the medicaldevice industries engaged in the production of anesthesia breathing bags. READ MORE