Essays about: "Vulnerability Evaluation"

Showing result 1 - 5 of 60 essays containing the words Vulnerability Evaluation.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  2. 2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  3. 3. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Mah Noor; Syeda Hina Murad; [2023]
    Keywords : Smart contract; Blockchain; Ethereum; attacks; security vulnerabilities; security audits;

    Abstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE

  4. 4. Assessment and evaluation of heterogeneity in data from immune infiltration spatial niches in lung cancer

    University essay from Lunds universitet/Matematisk statistik

    Author : Mahta Keivani Najafabadi; [2023]
    Keywords : Mathematics and Statistics;

    Abstract : The protein biomarker expressions in three types of sampled immune INFILTration spatial niches in lung cancer tissue were measured using the new technology Digital Spatial Profiler (DSP). The three types of immune INFILTration that were observed in lung tumors were STROMA identified as immune cells separate from tumor cells, Tertiary lymphoid structures (TLS) identified as dense structures of organized immune cells and finally Infiltraterate where immune cells dispersed among and in direct contact with tumor cells (INFILT). READ MORE

  5. 5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Holmquist; [2023]
    Keywords : Bluetooth; Android; Common Criteria; Automated dynamic security evaluation; Mobile device security; Bluetooth; Android; Common Criteria; Automatiserad dynamisk s¨akerhetstestning; S¨akerhet f¨or mobila enheter;

    Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE