Essays about: "Säkerhet för Öppen Källkod"

Showing result 1 - 5 of 17 essays containing the words Säkerhet för Öppen Källkod.

  1. 1. Deep Learning Model Deployment for Spaceborne Reconfigurable Hardware : A flexible acceleration approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Javier Ferre Martin; [2023]
    Keywords : Space Situational Awareness; Deep Learning; Convolutional Neural Networks; FieldProgrammable Gate Arrays; System-On-Chip; Computer Vision; Dynamic Partial Reconfiguration; High-Level Synthesis; Rymdsituationstänksamhet; Djupinlärning; Konvolutionsnätverk; Omkonfigurerbara Field-Programmable Gate Arrays FPGAs ; System-On-Chip SoC ; Datorseende; Dynamisk partiell omkonfigurering; Högnivåsyntes.;

    Abstract : Space debris and space situational awareness (SSA) have become growing concerns for national security and the sustainability of space operations, where timely detection and tracking of space objects is critical in preventing collision events. Traditional computer-vision algorithms have been used extensively to solve detection and tracking problems in flight, but recently deep learning approaches have seen widespread adoption in non-space related applications for their high accuracy. READ MORE

  2. 2. Security evaluation of the Matrix Server-Server API

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hîvron Stenhav; [2023]
    Keywords : Security; Ethical hacking; Open-Source; Matrix; Penetration testing; Threat modelling; API; Säkerhet; Etisk hackning; Öppen källkod; Matrix; Penetrationstesting; Hotmodellering; API;

    Abstract : This thesis presents a comprehensive security analysis of the Server-Server API of the Matrix protocol, providing a detailed examination of its vulnerabilities and contributing a significant body of knowledge to the cybersecurity field. The research focused exclusively on the Server-Server API of the Matrix protocol. READ MORE

  3. 3. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE

  4. 4. Enhancement-basedSmall TargetDetection for InfraredImages

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Hanqi; [2023]
    Keywords : Infrared Images; Small targets; Dilated Convolution; Infraröda bilder; Små mål; Dilaterad konvolution;

    Abstract : Infrared small target detection is widely used in fields such as military and security. UNet, which is a classical semantic segmentation method proposed in 2015, has shown excellent performance and robustness. However, U-Net suffers from the problem of losing small targets in deep layers after multiple down-sampling operations. READ MORE

  5. 5. Security vs performance in a real-time separation kernel : An analysis for multicore RISC-V architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Henrik Kultala; [2022]
    Keywords : Separation kernel; RISC-V; Multicore; Real-time system; Performance analysis; Open-source; Separationskärna; RISC-V; Multicore; Realtidssystem; Prestandaanalys; Öppen källkod;

    Abstract : In this thesis, we explored the possibility of introducing a few vulnerabilities to a separation kernel to increase its performance. We made modifications to S3K, an open-source separation kernel that is in the final stages of being designed. READ MORE