Advanced search

Showing result 1 - 5 of 71 essays matching the above criteria.

  1. 1. Using Social Media and Personality Predictions to Anticipate Startup Success

    University essay from Lunds universitet/Matematisk statistik

    Author : Daniel Stenson; [2023]
    Keywords : Machine Learning; Startup Success Predictions; Founder Personalities; Natural Language Processing; Social Media Analysis; Big 5 Personality Framework; Feed-forward Neural Network; XGBoost.; Mathematics and Statistics;

    Abstract : This thesis explores the potential of integrating predicted founder personalities, based on the Big 5 Personality Framework, into Machine Learning (ML) models to enhance the accuracy of early-stage startup success predictions. Leveraging Natural Language Processing (NLP) techniques, we extracted personality insights from founders' tweets, focusing on US startups funded between 2013 and 2015. READ MORE

  2. 2. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  3. 3. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  4. 4. A Comparative Study of Machine Learning Algorithms for Angular Position Estimation in Assembly Tools

    University essay from KTH/Matematisk statistik

    Author : Henrik Fagerlund; [2023]
    Keywords : applied mathematics; circular fully convolutional network; nearest neighbour method; power tools; threaded fasteners; neural network; machine learning; convolution; tillämpad matematik; cirkulärt faltningsnätverk; närmaste granne-metod; elverktyg; skruvförband; neuralt nätverk; maskininlärning; faltning;

    Abstract : The threaded fastener is by far the most common method for securing components together and plays a significant role in determining the quality of a product. Atlas Copco offers industrial tools for tightening these fasteners, which are today suffering from errors in the applied torque. READ MORE

  5. 5. Securing LwM2M with Mbed TLS in Contiki-NG

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Jayendra Ellamathy; [2023]
    Keywords : ;

    Abstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE