Advanced search

Showing result 1 - 5 of 14 essays matching the above criteria.

  1. 1. Analysis of simulated functional diversity in tropical forests: Differences between cultivated and naturally grown secondary forests in Cambodia

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Clarissa Graf; [2023]
    Keywords : physical geography; ecosystem analysis; functional diversity; plant functional traits; ecosystem modelling; secondary forest ecosystems; sustainable forest management; LPJ-GUESS; Earth and Environmental Sciences;

    Abstract : Accelerated deforestation represents a major global environmental concern. Over the last decades Cambodia has experienced a drastic decrease in forest cover and measures to halt deforestation have not been as effective as planned. READ MORE

  2. 2. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  3. 3. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE

  4. 4. Modeling a Security Operations Center

    University essay from KTH/Hälsoinformatik och logistik

    Author : Mario Tannous; Emre Ayhan; [2022]
    Keywords : SOC; SIEM; SIM; SEM; Virtual SOC; On-site SOC; Modern SOC; Traditional SOC; SOC; SIEM; SIM; SEM; Virtuell SOC; On-site SOC; Modern SOC; Traditionell SOC;

    Abstract : Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. READ MORE

  5. 5. Feasibility to implement a SIEM based on Open-source applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Björk; [2022]
    Keywords : IT-security; log management; open-source; SIEM; Correlation engine; IT-säkerhet; Loghantering; Öppen-källkod; SIEM; Korrelationsmotor;

    Abstract : As more and more things digitize, the need of logging events and managing these logs increases. To be able to makes sense of these logs, a (Security Information and Event Management) SIEM tool is commonly used both to correlate the events and as a tool to analyze the logs. READ MORE