Essays about: "Vulnerability Evaluation"
Showing result 1 - 5 of 60 essays containing the words Vulnerability Evaluation.
-
1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE
-
2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE
-
3. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
4. Assessment and evaluation of heterogeneity in data from immune infiltration spatial niches in lung cancer
University essay from Lunds universitet/Matematisk statistikAbstract : The protein biomarker expressions in three types of sampled immune INFILTration spatial niches in lung cancer tissue were measured using the new technology Digital Spatial Profiler (DSP). The three types of immune INFILTration that were observed in lung tumors were STROMA identified as immune cells separate from tumor cells, Tertiary lymphoid structures (TLS) identified as dense structures of organized immune cells and finally Infiltraterate where immune cells dispersed among and in direct contact with tumor cells (INFILT). READ MORE
-
5. Investigations and Development in the Area of Automated Security Evaluation of Android Devices with Focus on Bluetooth
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bluetooth is a technology that has been implemented in over 5 billion devices and therefore has a considerable impact. It is the dominant technology for shortrange wireless communication. READ MORE