Essays about: "Threat model"

Showing result 21 - 25 of 368 essays containing the words Threat model.

  1. 21. Development of a method to detect lysis and investigation if ozone has a lysing effect on Escherichia coli

    University essay from KTH/Proteinvetenskap

    Author : Klara Andrup; [2023]
    Keywords : Bacteremia; Ozone; Sepsis; Antibiotic resistance; Beta-galactosidase; Bakteriemi; Ozon; Sepsis; Antibiotikaresistans; Beta-galaktosidas;

    Abstract : Detta projekt genomfördes på företaget Sangair som för närvarande utvecklar medicinsk utrustning för att behandla bakteriemi med ozon. Bakteriemi uppstår när bakterier hamnar i blodomloppet, vilket kan trigga sepsis och septisk chock, med potentiellt dödligt utfall om obehandlat. READ MORE

  2. 22. Detecting Fraud in Affiliate Marketing: Comparative Analysis of Supervised Machine Learning Algorithms

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oskar Ahlqvist; [2023]
    Keywords : Fraud detection; Machine learning; Random Forest; support vector machine; Logistic Regression; Classification models; Affiliate marketing;

    Abstract : Affiliate marketing has become a rapidly growing part of the digital marketing sector. However, fraud in affiliate marketing raises a serious threat to the trust and financial stability of the involved parties. READ MORE

  3. 23. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  4. 24. Implementation of AI tools in 3D game art

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Gregory Frederic Diamond; Alexander Lindberg; [2023]
    Keywords : Text-to-image TTI ; UV-mapping; Retopologizing; Whiteboxing; Artificial Intelligence AI ;

    Abstract : AI in art saw a huge spike in popularity with text-to-image models like Midjourney and Stable Diffusion. The AI aids in creation of 2D art and is at times able to save massive amounts of time. Creation of 3D assets is an incredibly time consuming task but the field is currently lacking in research pertaining to artificial intelligence. READ MORE

  5. 25. Exploring the Feasibility of Using Fire Dynamics Simulator to Improve the Calculation of the Wildfire Available Safe Egress Time

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Alfred El Haddad; [2023]
    Keywords : Wildfire; Trigger buffer; WUI; WASET; FDS; QGIS; Level set; WUI evacuation.; Technology and Engineering;

    Abstract : Wildland-Urban Interface (WUI) fires pose a significant threat to public safety and property in areas where urban development encroaches upon natural landscapes. This thesis aims to investigate the effect of smoke from a WUI fire on the tenability conditions of a small village and to establish a worst-case-scenario trigger boundary around it as an improved basis for the WUI available safe egress time (WASET). READ MORE