Essays about: "Traditionella tillgångar"

Showing result 1 - 5 of 16 essays containing the words Traditionella tillgångar.

  1. 1. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Martin Kirov; [2023]
    Keywords : AI; Cyber Security; qualitative research; semi-structured interviews; perceptions; risks; opportunities; ethical considerations; legal implications; responsible AI deployment.;

    Abstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE

  2. 2. Generating Extreme Value Distributions in Finance using Generative Adversarial Networks

    University essay from KTH/Matematik (Avd.)

    Author : William Nord-Nilsson; [2023]
    Keywords : Extreme Value Theory; Generative Adversarial Networks; Stress Testing; Machine Learning; Convolutional Neural Networks; evtGAN; Extreme Events; Extremvärdesteori; Generativa nätverk; Stresstestning; Maskininlärning; Djupt neuralt nätverk; evtGAN; Extrema händelser;

    Abstract : This thesis aims to develop a new model for stress-testing financial portfolios using Extreme Value Theory (EVT) and General Adversarial Networks (GANs). The current practice of risk management relies on mathematical or historical models, such as Value-at-Risk and expected shortfall. READ MORE

  3. 3. HR options and their valuation – a case study

    University essay from KTH/Fastighetsekonomi och finans

    Author : Stefanos Nalmpantis; [2022]
    Keywords : Human Resources Options; Human Capital; Real Option Valuation; Personaloptioner; Humankapital; Real Optionsvärdering;

    Abstract : This thesis introduces and discusses the notion that real options theory can be applied to investment decisions when the value lies in human capital. This approach contributes in circumventing traditional problems which arise during valuation of intangible assets. READ MORE

  4. 4. Learning Policies for Path Selection in Attack Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Manuel Rickli; [2022]
    Keywords : ;

    Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE

  5. 5. Evaluation of portfolio optimization methods on decentralized assets and hybridized portfolios

    University essay from KTH/Matematik (Avd.)

    Author : Reza Salam Dalfi; Noel Mattar; [2022]
    Keywords : Traditional assets; DeFi; Cryptocurrencies; CVAR; FLPM; MSV; Portfolio; Optimization; Risk measurements; Traditionella tillgångar; DeFi; Cryptocurrencies; CVAR; FLPM; MSV; Portfölj optimering; Riskmått;

    Abstract : The market for decentralised financial instruments, more commonly known as cryptocurrencies, has gained momentum over the past recent years and the application areas are many. Modern portfolio theory has for years demonstrated its applicability to traditional assets, such as equities and other instruments, but to some extent omitted the application of mathematical portfolio theory with respect for cryptocurrencies. READ MORE