Essays about: "software security model"

Showing result 6 - 10 of 133 essays containing the words software security model.

  1. 6. Ray-tracing Based Investigations on the Deployment of RISs in Indoor Scenarios

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Swaroop Divya Sai Prem Nambala; Dexin Kong; [2023]
    Keywords : Reconfigurable intelligent surface; RIS; optimization; Ray-tracing; Mixed integer linear programming MILP ; Complex impulse response; Wireless Insite.; Technology and Engineering;

    Abstract : Reconfigurable intelligence surface (RIS) is a promising candidate technology for future 6G wireless communication systems. In existing communication systems, the network operators are unable to control the propagation environment, which causes significant limitations on communication performance. READ MORE

  2. 7. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 8. Quality Control: Detect Visual Defects on Products Using Image Processing and Deep Learning

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Isac Pettersson; Johan Skäremo; [2023]
    Keywords : Computer vision; Deep learning; image processing; Defect detection; Small object detection;

    Abstract : Computer vision, a prominent subfield of artificial intelligence, has gained widespread util-ization in diverse domains such as surveillance, security, and robotics. This research en-deavors to develop an semi-automated defect detection system serving as a quality controlassurance mechanism for Nolato MediTor, a manufacturing company within the medicaldevice industries engaged in the production of anesthesia breathing bags. READ MORE

  4. 9. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  5. 10. The future of IT Project Management & Delivery: NLP AI opportunities & challenges

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ester Viznerova; [2023]
    Keywords : AI; Artificial Intelligence; NLP; Natural Language Processing; Model; Project; Project Management; PM; Project Delivery; Software Development; IT; Agile; Disruption; Opportunities; Challenges; Use Cases; LLM; Large Language Model;

    Abstract : This thesis explores the opportunities and challenges of integrating recent Natural Language Processing (NLP) Artificial Intelligence (AI) advancements into IT project management and delivery (PM&D). Using a qualitative design through hermeneutic phenomenology strategy, the study employs a semi-systematic literature review and semi-structured interviews to delve into NLP AI's potential impacts in IT PM&D, from both theoretical and practical standpoints. READ MORE