Essays about: "Security"

Showing result 1 - 5 of 4202 essays containing the word Security.

  1. 1. A CASE STUDY OF ATTACKS AND PROTECTIONS OF HUMAN RIGHTS DEFENDERS IN POST-EUROMAIDAN UKRAINE

    University essay from Göteborgs universitet/Institutionen för globala studier

    Author : Louise Helen Elisabeth Nilsson; [2022-01-21]
    Keywords : human rights defenders; protections; security; attacks;

    Abstract : The efforts of human rights defenders play a crucial part in advancing human rights around the world. For these efforts, many defenders are at risk. In light of many attacks in recent years, it is clear that defenders are not as safe as they need to be. READ MORE

  2. 2. Smart Alarm- On the performance characteristics of linear, multi-linear and non-linear tensor models for alarm prediction in multi-sensor data.

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Chandraprakash Sahu; Ahamed Buhari; [2022]
    Keywords : Machine Learning; Tensor Regression; Deep Learning; Multivariate Time Series;

    Abstract : Information and modern computing technology advancements have led to a rise in the importance of maintenance, particularly in areas where a single components failure could have a significant impact on the overall systems performance. Numerous industries, including Alfa Laval, are operating on conditional-based systems that provide warnings only when a machine fails. READ MORE

  3. 3. Privacy-aware data generation : Using generative adversarial networks and differential privacy

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Felix Hübinette; [2022]
    Keywords : GANS; DP; generative adversarial networks; differential privacy; data generation; privacy; security;

    Abstract : Today we are surrounded by IOT devices that constantly generate different kinds of data about its environment and its users. Much of this data could be useful for different research purposes and development, but a lot of this collected data is privacy-sensitive for the individual person. READ MORE

  4. 4. Faculty Reflections on University Information Security Policy

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Sofia Dyrendahl; [2021-11-30]
    Keywords : Cybersecurity; employee compliance; information security policy; protection motivation theory; deterrence theory; neutralization theory; university;

    Abstract : Employee noncompliance of information security policy (ISP) is causingorganizations more and more money in the battle against cybersecurity threats. Threepopular theories within employee compliance and ISP research were used to createa conceptual framework to help explain the employees’ reflections, namely:protection motivation theory, deterrence theory and neutralization theory. READ MORE

  5. 5. Pattern Matching for Non-inductive Types in Code-generating Haskell EDSLs

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Thomas Li; [2021-09-20]
    Keywords : haskell; haski; edsl; pattern matching; embedded domain-specific languages; functional programming;

    Abstract : Internet of Things (IoT) devices are becoming increasingly common in the modernhome, as are IoT-related security vulnerabilities. There are reasons to believe thatmany of these vulnerabilities were caused by programming errors made possible dueto working in a low-level programming language. READ MORE