Essays about: "data obfuscation"

Showing result 6 - 10 of 12 essays containing the words data obfuscation.

  1. 6. Random projections in a distributed environment for privacy-preserved deep learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malcolm Bagger Toräng; [2021]
    Keywords : Random projections; Generative adversarial networks; Privacy metrics; Deep learning; Obfuscation.; Slumpmässiga projektioner; Generativa kontroversiella nätverk; Privatiserings-mått; Djupinlärning; Obfuskering.;

    Abstract : The field of Deep Learning (DL) only over the last decade has proven useful for increasingly more complex Machine Learning tasks and data, a notable milestone being generative models achieving facial synthesis indistinguishable from real faces. With the increased complexity in DL architecture and training data, follows a steep increase in time and hardware resources required for the training task. READ MORE

  2. 7. Intrusion Detection System for Android : Linux Kernel System Salls Analysis

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Martin Borek; [2017]
    Keywords : Android; security; malware; detection; system calls; ARM; Android; säkerhet; malware; detektion; systemanrop;

    Abstract : Smartphones provide access to a plethora of private information potentially leading to financial and personal hardship, hence they need to be well protected. With new Android malware obfuscation and evading techniques, including encrypted and downloaded malicious code, current protection approaches using static analysis are becoming less effective. READ MORE

  3. 8. Content Management Systems and MD5: Investigating Alternative Methods of Version Identification for Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Jakob Trusz; [2017]
    Keywords : Content Management Systems; Version Identification; Obfuscation;

    Abstract : WordPress is a very widely used content management system that enables users to easier create websites. The popularity of WordPress has made it a prime target for attacks by hackers since a potential vulnerability would affect many targets. Vulnerabilities that can be utilised in an attack are referred to as exploits. READ MORE

  4. 9. Designing interactions for data obfuscation in IoT

    University essay from Malmö högskola/Fakulteten för kultur och samhälle (KS)

    Author : Carlos Mario Rodriguez Perdomo; [2016]
    Keywords : IoT; critical design; privacy; data obfuscation; HCI; tangible interaction;

    Abstract : This project explores the internet of things (IoT) at home, especially the aspects related to the quantity and the quality of the of data collected by the smart devices and the violation of the users’ privacy this situation represents, since with the help of machine learning algorithms, these devices are capable of storing and analysing information related to the daily routine of each user at home. Therefore, this research enquires new ways to raise the user's’ awareness about the flow of the data within the IoT at home in order to empower them and give them back the status of administrators of this context by designing devices that are capable of obfuscating the data before it leaves the home. READ MORE

  5. 10. Readability in sustainability reporting before and after the financial crisis of 2008

    University essay from Göteborgs universitet/Företagsekonomiska institutionen

    Author : Kalle Ernfjord; Carl Gustafsson; [2015-01-16]
    Keywords : ;

    Abstract : Problem: Sustainability reporting is becoming more and more of a standard business practice. However, during the financial crisis of 2008, many companies experienced hard times from an economic perspective. This could have led to a decrease, an increase or no effect on the level of readability in sustainability reporting. READ MORE