Sökning: "Defense technique"

Visar resultat 1 - 5 av 20 uppsatser innehållade orden Defense technique.

  1. 1. Data Classification System Based on Combination Optimized Decision Tree : A Study on Missing Data Handling, Rough Set Reduction, and FAVC Set Integration

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xuechun Lu; [2023]
    Nyckelord :Missing data handling; Rough set reduction; FAVC Set; ID3; Saknade datahantering; Rough set reducering; FAVC Set; ID3;

    Sammanfattning : Data classification is a novel data analysis technique that involves extracting valuable information with potential utility from databases. It has found extensive applications in various domains, including finance, insurance, government, education, transportation, and defense. LÄS MER

  2. 2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Författare :Gustaf Tysk; [2023]
    Nyckelord :Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Sammanfattning : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. LÄS MER

  3. 3. Automated Generation of EfficientBitslice Implementations forArbitrary Sboxes

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Augustin Bariant; [2023]
    Nyckelord :Bitslicing; Cryptography; Whitebox; Compilation; Boolean circuits.; Parallélisation au bit; Cryptographie; Boîte blanche; Compilation; Circuits booléens.; Bitslicing; Kryptografi; Vit låda; Kompilering; Booleska kretsar.;

    Sammanfattning : Whitebox cryptography aims at protecting standard cryptographic algorithmsthat execute in attacker-controlled environments. In these, the attacker is ableto read a secret key directly from memory. Common implementations mask alldata at runtime and operate on masked data by using many small precomputedtables. LÄS MER

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xintai Liang; [2022]
    Nyckelord :Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Sammanfattning : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. LÄS MER

  5. 5. Visualizations in Augmented Reality for Multiple Real-Time Unmanned Aerial Vehicle Video Feeds : Visualizing Occluded and Out-of-View Entities

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Måns Bränneby; Oliver Gerfort; [2022]
    Nyckelord :Augmented reality; UAV; Visualization; Systematic literature review; Experiment; Augmenterad verklighet; UAV; Visualisering; Systematic literature review; Experiment;

    Sammanfattning : Background. The use of Unmanned Aerial Vehicles (UAVs) is today prevalent in both defense applications as well as in civilian tasks and is predicted to have a major socio-economic impact [22]. LÄS MER