Essays about: "thesis in database security system"

Showing result 1 - 5 of 45 essays containing the words thesis in database security system.

  1. 1. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Mehdi Bel Fdhila; [2023]
    Keywords : ;

    Abstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE

  2. 2. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  3. 3. Challenges in implementation of new CAD software in the manufacturing industry: a case study : Ongoing Implementation of CADMATIC Electrical for Valmet Tissue Mills

    University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)

    Author : Jonathan de Haan; [2023]
    Keywords : CADMATIC Electrical; Resistance to Change; Database System; Standardization; CADMATIC Electrical; Motstånd till Förändring; Databassystem; Standardisera;

    Abstract : The rapid advancement of computer software in the digital revolution has created a diverse range of powerful tools for various industries. Even though there is such a broad selection, there is no software that fits every individual or organization because of the different criterias. This is no exception for designing tools. READ MORE

  4. 4. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  5. 5. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control

    University essay from Uppsala universitet/Avdelningen för visuell information och interaktion

    Author : Gustav Norvik; [2022]
    Keywords : facial recognition; deep learning; machine learning; computer vision; image processing; artificial intelligence;

    Abstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE