Essays about: "Types of Information Systems and applications"

Showing result 1 - 5 of 53 essays containing the words Types of Information Systems and applications.

  1. 1. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  2. 2. Methods for Co-Orbital Threat Assessment in Space

    University essay from KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanik

    Author : Mathias Dahlman; [2023]
    Keywords : threats in space; threat assessment; Lambert s problem; genetic algorithms; NSGA-II; space surveillance and tracking capabilities; hot i rymden; hotbedömning; Lamberts problem; genetiska algoritmer; NSGA-II; inmätning och övervakning av rymdobjekt;

    Abstract : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. READ MORE

  3. 3. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  4. 4. Optimal Path Planning for Aerial Swarm in Area Exploration

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johanna Norén; [2022]
    Keywords : Optimization; Path planning; Dynamic programming; Area exploration; Aerial swarm; Multi-agent system; Optimering; Ruttplanering; Dynamisk programmering; Områdesutforskning; Drönarsvärm; Fler-agentsfall;

    Abstract : This thesis presents an approach to solve an optimal path planning problem for a swarm of drones. We optimize and improve information retrieval in area exploration within applications such a ‘Search and Rescue’-missions or reconnaissance missions. For this, dynamic programming has been used as a solving approach for a optimization problem. READ MORE

  5. 5. Localization of Combat Aircraft at High Altitude using Visual Odometry

    University essay from Umeå universitet/Institutionen för fysik

    Author : Jenny Nilsson Boij; [2022]
    Keywords : Monocular Visual Odometry; Monocular SLAM; High Altitude; Combat Aircraft; X-Plane;

    Abstract : Most of the navigation systems used in today’s aircraft rely on Global Navigation Satellite Systems (GNSS). However, GNSS is not fully reliable. For example, it can be jammed by attacks on the space or ground segments of the system or denied at inaccessible areas. READ MORE