Essays about: "attackera"

Showing result 1 - 5 of 26 essays containing the word attackera.

  1. 1. Developing a protocol for 3D-printable bioink from decellularised porcine tissue

    University essay from Lunds universitet/Livsmedelsteknik och nutrition (master)

    Author : Vendela Sandin; [2024]
    Keywords : Scaffold; Extracellular matrix; ECM; Bioink; Bioprinting; Collagen; Pharmaceutical technology; Technology and Engineering; Biology and Life Sciences;

    Abstract : T-cell administration via a scaffold is a promising tool for treatment of inoperable solid tumours. Traditional scaffold materials lack the complexity of the extracellular matrix (ECM) that cells normally grow in. An alternative is to instead use decellularised ECM (dECM) from biological tissue to create the scaffold. READ MORE

  2. 2. Adversarial robustness of STDP-trained spiking neural networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Karl Lindblad; Axel Nilsson; [2023]
    Keywords : ;

    Abstract : Adversarial attacks on machine learning models are designed to elicit the wrong behavior from the model. One such attack on image classifiers are maliciously crafted inputs that, to the human eye, look untampered with but have been carefully altered to cause misclassification. READ MORE

  3. 3. Asserting password crackers ability to target Swedish passwords : An analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Casper Jensen; [2023]
    Keywords : cyber security; passwords; it-security; swedish passwords;

    Abstract : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. READ MORE

  4. 4. Fundamental Attacks on Ethereum Oracles and How to Prevent Them

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mikael Jafari; [2023]
    Keywords : Blockchain; Attacks; Ethereum; Solana; Corda; Oracle; Blockkedja; Attacker; Ethereum; Solana; Corda; Orakel;

    Abstract : Many applications and protocols on blockchain platforms are reliant on real-world data which exists outside the blockchain, something which is not directly accessible through these platforms. To bridge this gap, blockchain oracles help these applications and protocols by providing them with this data. READ MORE

  5. 5. Strategies of Honeypot Placement in Cyberspace

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Madeleine Lindström; Samuel Lavebrink; [2023]
    Keywords : ;

    Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE