Essays about: "stolen data"

Showing result 1 - 5 of 11 essays containing the words stolen data.

  1. 1. Semi-active suspension seats in High speed crafts

    University essay from KTH/Marina system

    Author : Victor Ekström; [2019]
    Keywords : ;

    Abstract : The working environment of a high-speed-craft (HSC) can be uncomfortable and hazardous for the crew and passengers on board. This due to the repeated exposure to high levels of vibration and shocks, that can lead to reduced performance and severe injuries to the back and neck. READ MORE

  2. 2. Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications

    University essay from Linköpings universitet/Programvara och system

    Author : Lars Backman; [2018]
    Keywords : ;

    Abstract : The need for secure web applications grows ever stronger the more sensitive, personal data makes its’ way onto the Internet. During the last decade, hackers have stolen enormous amounts of data from high profile companies and social institutions. READ MORE

  3. 3. Feature learning with deep neural networks for keystroke biometrics : A study of supervised pre-training and autoencoders

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Erik Hellström; [2018]
    Keywords : Machine Learning; Feature Learning; Neural Networks; Keystroke Biometrics; Behaviosec; Behaviometrics;

    Abstract : Computer security is becoming an increasingly important topic in today’s society, withever increasing connectivity between devices and services. Stolen passwords have thepotential to cause severe damage to companies and individuals alike, leading to therequirement that the security system must be able to detect and prevent fraudulentlogin. READ MORE

  4. 4. A simulation study of an application layer DDoS detection mechanism

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT); KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Araxi Mekhitarian; Amir Rabiee; [2016]
    Keywords : Distributed Denial of Service attacks; DDoS; application layer; detection; defense; Distributed Denial of Service attacks; DDoS; application layer; detection; defense;

    Abstract : Over the last couple of years the rise of application layer Distributed Denial of Service (DDoS) attacks has significantly increased. Because of this, many issues have been raised on how organizations and companies can protect themselves from intrusions and damages against their systems and services. READ MORE

  5. 5. To download a movie or to buy fake branded clothes? : a study of consumers’ attitudes towards counterfeited and pirated products.

    University essay from Högskolan Kristianstad/Sektionen för hälsa och samhälle; Högskolan Kristianstad/Sektionen för hälsa och samhälle

    Author : Jamal Natour; Rewa Leila Anabtawi; [2012]
    Keywords : Counterfeit products; Piracy; Consumer attitude; Physical products; Digital products; Luxury brands; Genuine luxury brand; Illicit forged products;

    Abstract : Purchasing counterfeited luxury products and downloading pirated items have becomemore common nowadays. Fashion and IT industries are affected negatively by consumers’supportive attitude towards piracy and counterfeits. Many luxury branded companies havetheir exclusive brand names stolen by counterfeits producers. READ MORE