Essays about: "security in database"

Showing result 16 - 20 of 129 essays containing the words security in database.

  1. 16. Detecting Security Patches in Java OSS Projects Using NLP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andrea Stefanoni; [2022]
    Keywords : NLP; Deep Learning; vulnerability detection; security patch; Open Source Software; NLP; Deep Learning; sårbarhetsdetektering; säkerhetspatch; programvara med öppen källkod;

    Abstract : The use of Open Source Software is becoming more and more popular, but it comes with the risk of importing vulnerabilities in private codebases. Security patches, providing fixes to detected vulnerabilities, are vital in protecting against cyber attacks, therefore being able to apply all the security patches as soon as they are released is key. READ MORE

  2. 17. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  3. 18. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE

  4. 19. Mapping Carbon Storage and Potential Bioenergy Production in Södertälje Using High-resolution Biotope Database

    University essay from Stockholms universitet/Institutionen för naturgeografi

    Author : Lisa Åkerström; [2022]
    Keywords : Carbon storage; Carbon; Bioenergy; Bioenergy production; GIS; GIS-analysis; Scenario analysis; Biotope database; High-resolution biotope database; energy forests; CHP; heating plant; Bio-CCS; BECCS; carbon; carbon storage; carbon storage map; biotope database; Biotopdatabasen;

    Abstract : Global warming is caused by the human induced increase of Greenhouse Gases (GHG) in the atmosphere. GHG emissions need to be reduced, and carbon dioxide (CO2) emissions from fossil sources ceased to mitigate global warming. Energy production and use is a main contributor to fossil sourced emissions in Europe. READ MORE

  5. 20. The perspectives on successful aging among the older adults : A descriptive literature review

    University essay from Högskolan i Gävle/Avdelningen för vårdvetenskap

    Author : Lan Lihui; Xu Xinyi; [2022]
    Keywords : ;

    Abstract : Background: Aging increases the focus on successful aging. Successful aging has become a prominent paradigm of aging, but the perspectives and definitions of successful aging among elderly are quite lacking.Aim: To describe the perspectives on successful aging among the older adults.Methods: This research is a descriptive literature review. READ MORE