Essays about: "cybersäkerhet"
Showing result 6 - 10 of 91 essays containing the word cybersäkerhet.
-
6. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study
University essay from Högskolan Väst/Institutionen för ekonomi och itAbstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE
-
7. An initial investigation of Automatic Program Repair for Solidity Smart Contracts with Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis investigates how Large Language Models can be used to repair Solidity Smart Contracts automatically through the main contribution of this thesis, the Transformative Repair Tool. The Transformative Repair Tool achieves similar results to current state-of-the-art tools on the Smartbugs Curated Dataset and is the first published tool that uses Large Language Models to repair Solidity Smart Contracts. READ MORE
-
8. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE
-
9. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
10. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE