Advanced search
Showing result 1 - 5 of 14 essays matching the above criteria.
-
1. Analysis of simulated functional diversity in tropical forests: Differences between cultivated and naturally grown secondary forests in Cambodia
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : Accelerated deforestation represents a major global environmental concern. Over the last decades Cambodia has experienced a drastic decrease in forest cover and measures to halt deforestation have not been as effective as planned. READ MORE
-
2. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE
-
3. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
4. Modeling a Security Operations Center
University essay from KTH/Hälsoinformatik och logistikAbstract : Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. READ MORE
-
5. Feasibility to implement a SIEM based on Open-source applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As more and more things digitize, the need of logging events and managing these logs increases. To be able to makes sense of these logs, a (Security Information and Event Management) SIEM tool is commonly used both to correlate the events and as a tool to analyze the logs. READ MORE