Essays about: "security in database"

Showing result 21 - 25 of 129 essays containing the words security in database.

  1. 21. Systematic Literature Review of the Adversarial Attacks on AI in Cyber-Physical Systems

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Nail Valeev; [2022]
    Keywords : Adversarial attacks; machine learning; artificial intelligence; cyber-physical system; internet of things;

    Abstract : Cyber-physical systems, built from the integration of cyber and physical components, are being used in multiple domains ranging from manufacturing and healthcare to traffic con- trol and safety. Ensuring the security of cyber-physical systems is crucial because they provide the foundation of the critical infrastructure, and security incidents can result in catastrophic failures. READ MORE

  2. 22. Evaluation of Crop Water Use and Rice Yield Using Remote Sensing and AquaCrop Model for Three Irrigation Schemes in Sri Lanka

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Veronika Widengren; [2022]
    Keywords : WaPOR; remote sensing; evapotranspiration; crop water productivity; irrigation scheme; AquaCrop; Malwathu Oya; Sri Lanka; paddy rice; humid tropical climate; WaPOR; fjärranalys; evapotranspiration; vattenproduktivitet; bevattningssystem; AquaCrop; Malwathu Oya; Sri Lanka; ris; fuktigt tropiskt klimat;

    Abstract : With a changing climate and an increased competition over water resources for agricultural irrigation, the need to improve crop water productivity using time and cost-efficient methodologies have become critically important. The Malwathu Oya river basin in Sri Lanka is struggling with water scarcity, which threatens food security and the income of farmers. READ MORE

  3. 23. A Design- by- Privacy Framework for End- User Data Controls

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tangjia Zhou; [2021]
    Keywords : Privacy Data; GDPR; AWS; End- User Data Control; Sekretessdata; GDPR; AWS; kontroll av slutanvändardata;

    Abstract : Our internet makes data storage and sharing more convenient. An increasing amount of privacy data is being stored on different application platforms, so the security of these data has become a public concern. READ MORE

  4. 24. Formalise Defense Strategies in Design Patterns of Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Settlin; [2021]
    Keywords : Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE

  5. 25. Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture

    University essay from Högskolan i Halmstad

    Author : Jonas Henriksson; [2021]
    Keywords : Digital Forensic; Mutual Legal Assistance; Enterprise Architecture; System of Systems; Incident Command System; Fusion Center; Semantic Network; GraphQL; React; Cloud; Graph Database; Apollo; REST; Security;

    Abstract : Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. READ MORE