Essays about: "säkerhetslager"

Showing result 1 - 5 of 16 essays containing the word säkerhetslager.

  1. 1. Recognizing and Defending Against Phishing Attacks in Large Organizations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Matay Mayrany; [2023]
    Keywords : Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE

  2. 2. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  3. 3. Predicting the Impact of Supply Chain Disruptions Using Statistical Analysis and Machine Learning

    University essay from KTH/Matematisk statistik

    Author : Hannes Andersson; John Sjöberg; [2023]
    Keywords : Supply chain disruption; SMOTE; feature engineering; machine learning; random forest; statistics; applied mathematics; Störning i försörjningskedja; maskininlärning; matematik; statistik;

    Abstract : The dairy business is vulnerable to supply chain disruptions since large safety stocks to cover up losses are not always a viable option, therefore it is crucial to maintain a smooth supply chain to ensure stable delivery accuracies. Disruptions are unpredictable and hard to avoid in the supply chain, especially in cases where production errors cause lost production volume. READ MORE

  4. 4. Enhancing Stock Management Efficiency at Excillum AB

    University essay from KTH/Produktionsutveckling

    Author : Clive Carvalho; [2023]
    Keywords : Safety Stock; Inventory Management; Stock Management; EOQ; Order Quantity; Reorder Point; Inventory Optimisation; Inventory control; MTO; Customer order time; Lead time; Demand; Säkerhetslager; Lagerhantering; Lagerhantering; EOQ; Orderkvantitet; Återbeställningspunkt; Lageroptimering; Lagerkontroll; MTO; Kundordertid; Ledtid; Efterfrågan;

    Abstract : This thesis work aims to improve the stock management system of Excillum AB, a Stockholm-based company that specializes in high-performance X-ray sources. The current stock management system has limitations, resulting in gaps when managing the inventory. READ MORE

  5. 5. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE