Essays about: "mitigering"

Showing result 1 - 5 of 7 essays containing the word mitigering.

  1. 1. Menstrual health : Design tensions in raising awareness of the impacts of environmental pollution

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuni Huang; [2023]
    Keywords : menstrual health; pollution; awareness; first-person experiments; cultural probes; menstruationshälsa; föroreningar; medvetenhet; självbiografisk design; kultursonder;

    Abstract : Pollutants can harm menstrual health, and raising awareness of this is vital. This study is a research-through-design project that aims to investigate the design qualities of interactive technologies that aim to raise this kind of awareness. This study used first-person experiment method to design and develop cultural probes. READ MORE

  2. 2. Preventing Vulnerabilities and MitigatingAttacks on the MQTT Protocol

    University essay from Örebro universitet/Institutionen för naturvetenskap och teknik

    Author : Ahmad Yara; [2020]
    Keywords : MQTT; Fuzzing; Machine Learning; DoS; DDoS; MQTT; Fuzzing; Machine Learning; DoS; DDoS;

    Abstract : Syftet med denna studie är att undersöka och förstå hur säkerhetsöverträdelser kan förhindrasoch mitigeras i ett MQTT protokoll för att öka den överliggande säkerheten. Jag är särskiltintresserad av tekniker såsom Fuzzing, Fuzzy Logic och Machine Learning.. READ MORE

  3. 3. On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Anton Kanerva; Fredrik Helgesson; [2020]
    Keywords : Machine learning; deep neural networks; model interpretation; cyber security; Maskininlärning; djupa neurala nätverk; modelltolkning; cybersäkerhet;

    Abstract : Context. Machine learning is a constantly developing subfield within the artificial intelligence field. The number of domains in which we deploy machine learning models is constantly growing and the systems using these models spread almost unnoticeably in our daily lives through different devices. READ MORE

  4. 4. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Henrik Ottosson; Per Lindquist; [2018]
    Keywords : Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security;

    Abstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE

  5. 5. Evaluating Mitigations For Meltdown and Spectre : Benchmarking performance of mitigations against database management systems with OLTP workload

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Victor Nilsson; [2018]
    Keywords : Spectre; Meltdown; Database; Database Management Systems; MariaDB; PostgreSQL; OLTP; Transactions Per Minute; Performance; Spectre; Meltdown; Databas; Databashanteringssystem; MariaDB; PostgreSQL; OLTP; Transaktioner per minut; Prestanda;

    Abstract : With Spectre and Meltdown out in the public, a rushed effort was made to patch these vulnerabilities by operating system vendors. However, with the mitigations against said vulnerabilities there will be some form of performance impact. READ MORE