Advanced search
Showing result 1 - 5 of 74 essays matching the above criteria.
-
1. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE
-
2. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE
-
3. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE
-
4. Amplifying heap overflow vulnerability detection with reinforcement learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE
-
5. Challenges in implementation of new CAD software in the manufacturing industry: a case study : Ongoing Implementation of CADMATIC Electrical for Valmet Tissue Mills
University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)Abstract : The rapid advancement of computer software in the digital revolution has created a diverse range of powerful tools for various industries. Even though there is such a broad selection, there is no software that fits every individual or organization because of the different criterias. This is no exception for designing tools. READ MORE