Essays about: "computer security threat"

Showing result 26 - 30 of 42 essays containing the words computer security threat.

  1. 26. Insider Threat detection using Isolation Forest

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Maja Scherman; Joakim Bülow; [2018]
    Keywords : MSc; Insider Threats; Isolation Forest; Machine Learning; Security; Technology and Engineering;

    Abstract : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. READ MORE

  2. 27. Formal Verification of Hardware Peripheral with Security Property

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Jonathan Yao Håkansson; Niklas Rosencrantz; [2017]
    Keywords : Formal Verification NuSMV JavaPathFinder Spin Promela CTL LTL DMA UART Model Checking Theorem Proving;

    Abstract : One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that the security is an important issue to look at. READ MORE

  3. 28. A usability study of post-quantum algorithms

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Marcus Kindberg; [2017]
    Keywords : post-quantum cryptography; Technology and Engineering;

    Abstract : There is a non-negligible risk that a quantum computer capable of breaking most modern public key encryption will be invented within the next couple of decades. All data that have to stay secret for more than 10-20 years should therefore be encrypted using quantum-resistant algorithms. READ MORE

  4. 29. A study of online users' cyber threat awareness and their use of threat countermeasures

    University essay from Umeå universitet/Institutionen för informatik

    Author : Yugandhar Gopisetty; [2016]
    Keywords : Threat; HCI; online; security; user; virus; design; interaction; countermeasures;

    Abstract : The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. READ MORE

  5. 30. Context-dependent voice commands in spoken dialogue systems for home environments : A study on the effect of introducing context-dependent voice commands to a spoken dialogue system for home environments

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Karl Dahlgren; [2013]
    Keywords : Spoken dialogue system; Context-dependency; Absolute semantic; Ubiquitous Computing; Ambient Intelligence; Voice recognition; Speech communication;

    Abstract : This thesis aims to investigate the eect context could have to interaction between a user and a spoken dialogue system. It was assumed that using context-dependent voice commands instead of absolute semantic voice commands would make the dialogue more natural and also increase the usability. READ MORE