Essays about: "malicious"

Showing result 1 - 5 of 257 essays containing the word malicious.

  1. 1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Victor Mertala; Nordin Christopher; [2024]
    Keywords : CRYSTAL Framework; Tiny Twin; Tiny Digital Twin; Rebeca; Timed Rebeca; monitor; cyber attacks;

    Abstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE

  2. 2. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Sofia Leksell; [2024]
    Keywords : Federated Learning; Adversarial Attacks; Regression; Classification;

    Abstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving  a noticeable gap in FL research specifically for regression models. READ MORE

  3. 3. Attack Strategies in Federated Learning for Regression Models : A Comparative Analysis with Classification Models

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Sofia Leksell; [2024]
    Keywords : Federated Learning; Adversarial Attacks; Regression; Classification;

    Abstract : Federated Learning (FL) has emerged as a promising approach for decentralized model training across multiple devices, while still preserving data privacy. Previous research has predominantly concentrated on classification tasks in FL settings, leaving  a noticeable gap in FL research specifically for regression models. READ MORE

  4. 4. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  5. 5. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE