Advanced search

Showing result 1 - 5 of 74 essays matching the above criteria.

  1. 1. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Victor Massy; [2023]
    Keywords : Multiparty computation; Trusted execution envrionment; Web advertising; Private attribution reporting; Flerpartsberäkning; Pålitlig exekveringsmiljö; Webannonsering; Privat attributionsrapportering;

    Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE

  2. 2. A COMPARISON OF SEARCHING DATA WITH, AND WITHOUT ELASTICSEARCH IN A SQL DATABASE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Mehdi Bel Fdhila; [2023]
    Keywords : ;

    Abstract : Digitalization and managing big data are today becoming vital across all sectors of our society. Databases are highly valuable for companies and organizations to ensure that information resources are well managed. As of today, there are diverse database management systems (DBMS) to choose from. READ MORE

  3. 3. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yang Wang; [2023]
    Keywords : Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE

  4. 4. Amplifying heap overflow vulnerability detection with reinforcement learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Erik Thomasson; Ludwig Wideskär; [2023]
    Keywords : ;

    Abstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE

  5. 5. Challenges in implementation of new CAD software in the manufacturing industry: a case study : Ongoing Implementation of CADMATIC Electrical for Valmet Tissue Mills

    University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)

    Author : Jonathan de Haan; [2023]
    Keywords : CADMATIC Electrical; Resistance to Change; Database System; Standardization; CADMATIC Electrical; Motstånd till Förändring; Databassystem; Standardisera;

    Abstract : The rapid advancement of computer software in the digital revolution has created a diverse range of powerful tools for various industries. Even though there is such a broad selection, there is no software that fits every individual or organization because of the different criterias. This is no exception for designing tools. READ MORE