Essays about: "vulnerability characterization"

Found 5 essays containing the words vulnerability characterization.

  1. 1. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Edvin Kjell; Sebastian Frisenfelt; [2021]
    Keywords : TLS; HTTPS; HSTS; cipher suites; vulnerabilities;

    Abstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE

  2. 2. Modelling the Resilience of Offshore Renewable Energy System Using Non-constant Failure Rates

    University essay from Uppsala universitet/Institutionen för elektroteknik

    Author : Mussie Abraham Beyene; [2021]
    Keywords : offshore renewable energy; resilience; wave energy farm; vulnerability; characterization; weather climates; failure rate; wind energy farm; generalized extreme value method; significant wave height; wind speed;

    Abstract : Offshore renewable energy systems, such as Wave Energy Converters or an Offshore Wind Turbine, must be designed to withstand extremes of the weather environment. For this, it is crucial both to have a good understanding of the wave and wind climate at the intended offshore site, and of the system reaction and possible failures to different weather scenarios. READ MORE

  3. 3. Adversarial Attacks against Behavioral-based Continuous Authentication

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maciej Kufel; [2020]
    Keywords : ;

    Abstract : Online identity theft and session hijacking attacks have become a major hazardin recent years and are expected to become more frequent in the years to come.Unlike the traditional authentication methods, continuous authentication based onthe characterization of user behavior in interactions with the computer system allowsto continuously verify the user’s identity and mitigates the risk of such forms ofmalicious access. READ MORE

  4. 4. Go with the flow : A study exploring public transit performance using a flow network model

    University essay from Uppsala universitet/Avdelningen för systemteknik

    Author : Axel Boman; Erik Nilsson; [2020]
    Keywords : GTFS; graph mining; flow network model; capacity modeling; public transit; public transport networks; maximum flow; minimum cut; maxflow; mincut; vulnerability characterization; public transit performance;

    Abstract : As opposed to public transit agencies' well-developed data generation capabilities, their utilization of their data is often overlooked. This study will tap into the potential of using the GTFS data format from an agency stakeholder perspective to assess transit performance. READ MORE

  5. 5. Identification and characterization of genes that are involved in reward mechanisms in ethanol self-administration

    University essay from SLU/Dept. Of Plant Biology

    Author : Hung Trinh; [2009]
    Keywords : brain reward pathway; ethanol self-administration; neurotransmitter receptor; real-time PCR; mRNA; VTA; NAc; Sn; CPu;

    Abstract : Alcohol addiction is one of the most common drug addictions amongst societies. Alcohol abuse, can lead serious injuries, severe diseases or even death. Despite intensive research, complete knowledge about alcohol addiction and a specific "ethanol receptor" has not been found yet. READ MORE