Essays about: "cyberwarfare"

Found 3 essays containing the word cyberwarfare.

  1. 1. All Negative on the Western Front: Analyzing the Sentiment of the Russian News Coverage of Sweden with Generic and Domain-Specific Multinomial Naive Bayes and Support Vector Machines Classifiers

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : David Michel; [2021]
    Keywords : sentiment analysis; news sentiment; text classification; cross-domain sentiment classification; domain specificity; domain-transfer problem; transfer learning; knowledge transfer; support vector machines; SVM; multinomial naive Bayes; Sweden; Aurora 17; Russia; Russian news; RT; Sputnik; cyberwarfare; influence campaign; disinformation; fake news; propaganda;

    Abstract : This thesis explores to what extent Multinomial Naive Bayes (MNB) and Support Vector Machines (SVM) classifiers can be used to determine the polarity of news, specifically the news coverage of Sweden by the Russian state-funded news outlets RT and Sputnik. Three experiments are conducted. READ MORE

  2. 2. Improving the Cyber defence of an organisation based on IP Geolocation and security appliances

    University essay from Högskolan Väst/Avdelningen för Matematik, Data- och Lantmäteriteknik; Högskolan Väst/Avdelningen för Matematik, Data- och Lantmäteriteknik

    Author : Aleksandar Opasinov; Sina Eftekhari; [2020]
    Keywords : Cybersecurity; Cisco ASA Firewall; IP Geolocation; Malware; Cyber Attacks; IPS; IT-säkerhet; Cisco ASA Brandvägg; IP Geolocation; Malware; Cyberattacker; IPS;

    Abstract : As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. READ MORE

  3. 3. Cyber Ranges: A design and implementation of Virtual Honeypots

    University essay from KTH/Kommunikationsnät

    Author : Haris Salam; [2013]
    Keywords : ;

    Abstract : Traditionally, many devices such as firewalls, secured servers, computer networks,hosts and routers. But with rapid technological advancements, securityfor the virtual world also needed improvement. As they say need is the motherof all inventions; such a need lead to the creation of Honey pots. READ MORE