Essays about: "software security model"
Showing result 6 - 10 of 133 essays containing the words software security model.
-
6. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE
-
7. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE
-
8. Quality Control: Detect Visual Defects on Products Using Image Processing and Deep Learning
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : Computer vision, a prominent subfield of artificial intelligence, has gained widespread util-ization in diverse domains such as surveillance, security, and robotics. This research en-deavors to develop an semi-automated defect detection system serving as a quality controlassurance mechanism for Nolato MediTor, a manufacturing company within the medicaldevice industries engaged in the production of anesthesia breathing bags. READ MORE
-
9. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE
-
10. The future of IT Project Management & Delivery: NLP AI opportunities & challenges
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : This thesis explores the opportunities and challenges of integrating recent Natural Language Processing (NLP) Artificial Intelligence (AI) advancements into IT project management and delivery (PM&D). Using a qualitative design through hermeneutic phenomenology strategy, the study employs a semi-systematic literature review and semi-structured interviews to delve into NLP AI's potential impacts in IT PM&D, from both theoretical and practical standpoints. READ MORE