Sökning: "Defense technique"
Visar resultat 1 - 5 av 20 uppsatser innehållade orden Defense technique.
1. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. LÄS MER
2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikSammanfattning : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. LÄS MER
3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. LÄS MER
4. Authentication Techniques Based on Physical Layer Attributes
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. LÄS MER
5. Visualizations in Augmented Reality for Multiple Real-Time Unmanned Aerial Vehicle Video Feeds : Visualizing Occluded and Out-of-View Entities
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. The use of Unmanned Aerial Vehicles (UAVs) is today prevalent in both defense applications as well as in civilian tasks and is predicted to have a major socio-economic impact [22]. LÄS MER