Essays about: "conclusion on computer security"

Showing result 1 - 5 of 29 essays containing the words conclusion on computer security.

  1. 1. Mutual Enhancement of Environment Recognition and Semantic Segmentation in Indoor Environment

    University essay from

    Author : Venkata Vamsi Challa; [2024]
    Keywords : Semantic Segmentation; Scene Classification; Environment Recognition; Machine Learning; Deep Learning; Image Classification; Vision Transformers; SAM Segment Anything Model ; Image Segmentation; Contour-aware semantic segmentation;

    Abstract : Background:The dynamic field of computer vision and artificial intelligence has continually evolved, pushing the boundaries in areas like semantic segmentation andenvironmental recognition, pivotal for indoor scene analysis. This research investigates the integration of these two technologies, examining their synergy and implicayions for enhancing indoor scene understanding. READ MORE

  2. 2. How to Educate an Organization in Working with Security Topics from a User Experience Perspective

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Felicia Gabrielii Augustsson; Anna Dahlström; [2023]
    Keywords : User centered design; threat analysis; security; experiential learning; gamification; interactive learning tool; the design process; Technology and Engineering;

    Abstract : In today's rapidly evolving society, the pervasive influence of technology has profoundly transformed various aspects of human life, presenting both unprecedented opportunities and critical security challenges. To mitigate the risks of data breaches, malicious attacks, and overall cyber threats, companies have taken proactive measures by providing education and training to their employees in the areas of cyber security and software security. READ MORE

  3. 3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  4. 4. Detection of Prototype Pollution Using Joern : Joern’s Detection Capability Compared to CodeQL’s

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tobias Fröberg; [2023]
    Keywords : CodeQL; Computer security; JavaScript; Joern; Prototype pollution; Vulnerability detection; CodeQL; Datorsäkerhet; JavaScript; Joern; Prototypförorening; Sårbarhetsdetektering;

    Abstract : JavaScript-built programs are widely used by the general public, but they are also vulnerable to JavaScript-related exploits stemming from the newly discovered prototype pollution vulnerability. Research has been focused on understanding the impact of this vulnerability and finding ways to detect it using code analysis tools. READ MORE

  5. 5. Breaking WebAssembly Crypto Miner Detection by Obfuscation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Ekner; [2023]
    Keywords : Computer Security; WebAssembly; Crypto mining; Code Obfuscation; Browsers; Datasäkerhet; WebAssembly; Kryptovalutautvinning; Kodobfuskering; Webbläsare;

    Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE