Essays about: "drawbacks of information SYSTEM"

Showing result 1 - 5 of 57 essays containing the words drawbacks of information SYSTEM.

  1. 1. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  2. 2. Estimating Impacts Using LCA in Procurement Processes : A case study for a multinational networking and telecommunications company

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Gustav Westling; [2023]
    Keywords : Procurement; Sustainability; Sourcing; Life Cycle Analysis; Life Cycle Assessment; LCA; SCM; Supply Chain Management; Inköp; Hållbarhet; Strategiskt inköp; Livscykelanalys; LCA; SCM; Försörjningskedjehantering; Supply chain-hantering;

    Abstract : This thesis investigates how a company can implement life cycle analysis (LCA) into procurement. The thesis also explores the potential synergies between the LCA and procurement. A single casestudy was utilized for this purpose. It uses LCAs using a simplified methodology, interviews, and a literature review to carry out the study. READ MORE

  3. 3. Analyzing different approaches to Visual SLAM in dynamic environments : A comparative study with focus on strengths and weaknesses

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kristín Sól Ólafsdóttir; [2023]
    Keywords : Visual SLAM; RGB-D Vision; Dynamic Objects; Object Detection; Multi-Object Tracking; Image Segmentation; Optical Flow; Visual SLAM; RGB-D Syn; Dynamiska objekt; Objektdetektering; Multi-Objekt Spårning; Bildsegmentation; Optiskt Flöde;

    Abstract : Simultaneous Localization and Mapping (SLAM) is the crucial ability for many autonomous systems to operate in unknown environments. In recent years SLAM development has focused on achieving robustness regarding the challenges the field still faces e.g. dynamic environments. READ MORE

  4. 4. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  5. 5. Using Semantic Data for Penetration Testing : A Study on Utilizing Knowledge Graphs for Offensive Cybersecurity

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013); Karlstads universitet/Fakulteten för humaniora och samhällsvetenskap (from 2013)

    Author : Björn Wei; [2022]
    Keywords : Semantic data; penetration testing; Knowledge Graphs; vulnerability analysis; threat modelling; web application; data analysis;

    Abstract : Cybersecurity is an expanding and prominent field in the IT industry. As the amount of vulnerabilities and breaches continue to increase, there is a need to properly test these systems for internal weaknesses in order to prevent intruders proactively. Penetration testing is the act of emulating an adversary in order to test a system’s behaviour. READ MORE