Essays about: "security training"
Showing result 31 - 35 of 162 essays containing the words security training.
-
31. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE
-
32. Assessing the security of a Garmin Smartwatch through Ethical hacking
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A smartwatch is a device used to track personal data related to health, training, sleep, and diet. The smartwatch industry has seen a steady growth in recent years and is expected to continue to grow. Today many people see the use of their smartwatch as an essential part of their daily routine. READ MORE
-
33. Factors Influencing the Implementation of Information Security Risk Management : A case study of Nigerian Commercial Banks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The banking industry is one of the critical infrastructures in any economy. The services rendered by banks are systematically based on innovation, products, and technology to leverage their services. Several associated risks come along with the rendering of these banking services. READ MORE
-
34. Cybersecurity engagement in a remote work environment
University essay from Lunds universitet/Institutionen för informatikAbstract : The recent spread of COVID-19 pandemic encouraged organisations to facilitate a remote work environment for their employees. This work environment would most likely continue in the upcoming years. At the same time, this context has been followed with an increase in cyberthreats that could affect the optimal processes of organisations. READ MORE
-
35. A Game-theoretical Framework for Byzantine-Robust Federated Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE