Essays about: "Threat Assessment applications"

Showing result 1 - 5 of 15 essays containing the words Threat Assessment applications.

  1. 1. Anticipating Glacier Lake Outburst Floods (GLOFs): an impact-based forecasting framework for managing GLOF risks in Nepal.

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Grace Muir; [2023]
    Keywords : Anticipatory Action; Impact-based Forecasting; Glacier Lake Outburst Flood; Nepal; Risk-informed Early Action; Prediction; Disaster Risk Management; Science General;

    Abstract : Glacier lake outburst floods (GLOFs) are an increasingly documented threat across the Himalayan region, wherein Nepal is situated. GLOFs involve a rapid discharge of water from a lake situated at the side, front, within, beneath, or on the surface of a glacier. READ MORE

  2. 2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 3. Can AI Respect Patient Autonomy?

    University essay from Umeå universitet/Institutionen för idé- och samhällsstudier

    Author : Ellen Svensson; [2023]
    Keywords : AI; AGI; black box; autonomy; respect for autonomy; informed consent; bias; clinical care; healthcare; bioethics; opacity; transparency; explicability; voluntariness; republican freedom; liberty; non-domination;

    Abstract : AI is entering clinical care and the healthcare sector in a big way, at the same time, a growing number of scholars are concerned that this technology cannot adhere to current bioethical principles. In particular, there are increasing concerns that AI poses a threat to the autonomy of patients by being irreconcilable with the practice of informed consent. READ MORE

  4. 4. Methods for Co-Orbital Threat Assessment in Space

    University essay from KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanik

    Author : Mathias Dahlman; [2023]
    Keywords : threats in space; threat assessment; Lambert s problem; genetic algorithms; NSGA-II; space surveillance and tracking capabilities; hot i rymden; hotbedömning; Lamberts problem; genetiska algoritmer; NSGA-II; inmätning och övervakning av rymdobjekt;

    Abstract : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. READ MORE

  5. 5. Securing cloud-hosted IoT Workflows with Intel SGX

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adnan Jamil Ahsan; [2022]
    Keywords : IoT; Node-RED; Azure; SGX; Gramine; Trusted Execution Environment; Security; STRIDE;

    Abstract : The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an open-source visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. READ MORE