Essays about: "alerts"
Showing result 1 - 5 of 78 essays containing the word alerts.
-
1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
2. Iot-based Saline Volume Monitoring and Alert System
University essay from Blekinge Tekniska HögskolaAbstract : This project presents a comprehensive study on the design and implementationof an Internet of Things (IoT)-based system for monitoring and alerting salinevolumes in healthcare environments.Background: In healthcare settings, the accurate monitoring of saline volumesin Intravenous (IV) drip systems is crucial for ensuring patient safety and effectivetreatment. READ MORE
-
3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
4. Bluetooth Based Bird Detection System
University essay from Blekinge Tekniska HögskolaAbstract : Context: Windmills became one of main sources of energy. Sincethey are placed in open areas, there are many chances that birds mayenter the wind farms and get killed or damaged. Some wind farms usepulse radar systems for saving the birds from windmills. In this pulseradar technology, the turbines are turned off automatically when a birdis detected. READ MORE
-
5. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE