Essays about: "defense system"

Showing result 6 - 10 of 149 essays containing the words defense system.

  1. 6. Characterization of Antigenic Properties of Two Immunogenic Proteins of Streptococcus pneumoniae 

    University essay from Uppsala universitet/Institutionen för medicinsk biokemi och mikrobiologi

    Author : Mawj Jasimalsalih; [2023]
    Keywords : Immunogenic Proteins; PrsA; MalX; Membrane Vesicles; Protein Properties; Streptococcus pneumoniae virulence factors;

    Abstract : The bacterium Streptococcus pneumoniae (pneumococcus), is considered to be a leading cause of morbidity and mortality globally, particularly in infants and the elderly. It is one of the most frequent causes of respiratory tract infections, which sporadically have the potential to develop into serious invasive symptoms including sepsis and meningitis. READ MORE

  2. 7. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  3. 8. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  4. 9. Further Developing Preload Lists for the Tor Network

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Daniel Bahmiary; [2023]
    Keywords : Tor; DNS; Preload list; Crawling; Tor; DNS; Preload lista; Webbkrypning;

    Abstract : A recently proposed defense for the anonymity network Tor uses preload lists of domains to determine what should be cached in the Domain Name System (DNS) caches of Tor relays. The defense protects against attacks that infer what is cached in Tor relays. READ MORE

  5. 10. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuechun Lu; [2023]
    Keywords : Missing data handling; Rough set reduction; FAVC Set; ID3; Saknade datahantering; Rough set reducering; FAVC Set; ID3;

    Abstract : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. READ MORE