Essays about: "känslig.."

Showing result 21 - 25 of 329 essays containing the word känslig...

  1. 21. Evaluating Membership Inference Attacks on Synthetic Data Generated With Formal Privacy Guarantees

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elliot Beskow; Erik Lindé; [2023]
    Keywords : ;

    Abstract : Synthetic data generation using generative machine learning has been increasinglypublicized as a new tool for data anonymization. It promises to offer privacy whilemaintaining the statistical properties of the original dataset. This study focuses on the riskswith synthetic data by looking mainly at two aspects: privacy and utility. READ MORE

  2. 22. Modelling of electric transients in 24 V power supply systems for commercial vehicles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ajay Ajay; [2023]
    Keywords : ;

    Abstract : Technology is revolutionising every aspect of modern-day transport and evolving rapidly. The traditional electric system of vehicles produced by SCANIA uses a 24 V DC bus system to provide power and ground to all connected electrical units. READ MORE

  3. 23. Dimensioning study of EPR2 fuel pool cooling system

    University essay from KTH/Fysik

    Author : Thomas Rubler; [2023]
    Keywords : EPR2; PTR; spent fuel pool; heat exchange; EPR2; PTR; bassäng för utbränt kärnbränsle; värmeväxling.;

    Abstract : The PTR system allows the EPR2 fuel pool to be cooled. The evacuation of the residual power fromthe pool is ensured by several heat exchangers and pumps, which have to be dimensioned in order to meetdifferent requirements.In order to dimension them, the worst-case scenario of the components must first be determined. READ MORE

  4. 24. Penetration testing of a smart speaker

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amin Nouiser; [2023]
    Keywords : Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Abstract : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. READ MORE

  5. 25. Factors Influencing Adoption of Information Security

    University essay from Blekinge Tekniska Högskola/Institutionen för industriell ekonomi

    Author : Klara Wassenius; Wilma Jonasson; [2023]
    Keywords : Technology Adoption; Information Security; TOE Framework; Decisionmaking; Qualitative Research.; Technology Adoption; Informations Säkerhet; TOE Ramverket; Beslutsfattande; Kvalitativ Studie.;

    Abstract : Background: Over the past years, organisations have been facing an increasedthreat from cyber criminality. This amplifies the necessity for organisations to implement highly secure systems to protect sensitive information.Purpose: Explore and identify factors that influence organisations’ willingness toadopt information security. READ MORE