Essays about: "Secure Identification"

Showing result 1 - 5 of 61 essays containing the words Secure Identification.

  1. 1. Midwifery education in Sub- Saharan Africa – A systematic integrative literature review

    University essay from

    Author : Miriam Hyrkäs; My Mowitz; [2023-06-07]
    Keywords : Midwifery; Education; ICM Standards for Midwifery Education 2021 ; Sub-Saharan Africa;

    Abstract : Background: Maternal mortality remains a major global health concern, with the highest rate found in Sub-Saharan Africa. There is documented lack of well-trained midwives, hence, a need for increased quality midwifery education to improve maternity care and secure women's reproductive health. READ MORE

  2. 2. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  3. 3. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  4. 4. Assessing Supply Chain Resilience to Mitigate Supply Chain Risks : A case study of the inbound logistics @ Volvo CE

    University essay from Linköpings universitet/Logistik- och kvalitetsutveckling

    Author : Emma Fridolfsson; Lova de Man Lapidoth; [2023]
    Keywords : supply chain resilience; SCRES; supply chain risk; supply chain risk management; supply chain disruption; risk sources; risk drivers; resilience capabilities; SCRES elements; risk mitigation strategies;

    Abstract : In recent years, the frequency of disruptive events in supply chains has increased. This is partly due to the fact that supply chains are more globalized and more complex, with deeper tiering among suppliers. This makes the supply chain more vulnerable to risks. READ MORE

  5. 5. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Lövgren; [2023]
    Keywords : Open-Source; Vulnerability Identification; High-Risk Developers; Öppen Källkod; Identifiering av Sårbarheter; Högriskutvecklare;

    Abstract : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. READ MORE