Essays about: "virtuell maskin"

Showing result 1 - 5 of 21 essays containing the words virtuell maskin.

  1. 1. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  2. 2. Human Digital Shadow : A Conceptual Model for Quantifying Wheel Loader Operator’s Behaviors

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Renyi Yuan; [2023]
    Keywords : Digital Shadow; Conceptual Modelingm Human-Machine Interaction; Wheel Loader; Digital Skugga; Konceptuell Modellering; Interaktion Mellan Människa och Maskin; Hjullastare;

    Abstract : Digital Twin has been a trendy topic for half a century in the engineering field but has recently been criticized for its potential infeasibility. To approach the physical-virtual dual-connection goal, Digital Shadow has been prompted to organize the data into a virtual version for driving insights and supporting decision-making. READ MORE

  3. 3. Digital Model of a Mining Stacker for Material Tracking : Modelling a Mining Stacker with Forward Kinematics for Material Tracking

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Livia Maria Waller; [2023]
    Keywords : Mining; Material tracking; Bucket wheel stacker; Gruvteknik; Materialspårning; Skovelhjulsstaplar;

    Abstract : The Fourth Industrial Revolution is reshaping the manufacturing industry with the emergence of interconnectivity, smart automation, and cyber-physical systems. A popular example of cyber-physical systems is the digital twin or digital model, which both create a virtual (cyber) representation of a system. READ MORE

  4. 4. Simulation Methods at Epiroc within Underground Rock Excavation : Simuleringsmetoder vid Epiroc inom underjordsdivisionen.

    University essay from Örebro universitet/Institutionen för naturvetenskap och teknik

    Author : Simon Granberg; [2022]
    Keywords : Simulation methods; Simulation tools; Lean; Improvements; Simuleringsmetoder; Simuleringsverktyg; Lean; Förbättringsarbete;

    Abstract : Epiroc Underground Rock Excavation is a manufacturer of machines that operate in underground mines. The machines are complex and advanced with different functions and systems that interact with each other. Simulations provides a picture of machine design, its functions and how the real-world result would be. READ MORE

  5. 5. MACsec in Classic AUTOSAR : MACsec Implementation PoC on Classic AUTOSAR ECUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamna Zahid; [2022]
    Keywords : Automotive Ethernet; MKA; MACsec; Network security; Classic AUTOSAR; Automotive Ethernet; MKA; MACsec; Nätverkssäkerhet; Classic AUTOSAR;

    Abstract : Classic AUTOSAR provides a standardized architecture and guidelines for automotive development. However, it does not include specifications for securing Ethernet communication. The IEEE 802.1AE standard specifies a security standard called Media Access Control Security (MACsec) to protect Ethernet communication. READ MORE