Sökning: "impersonation"

Visar resultat 1 - 5 av 20 uppsatser innehållade ordet impersonation.

  1. 1. Deepfake detection by humans : Face swap versus lip sync

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Isak Sundström; [2023]
    Nyckelord :Deepfakes; Face swap; Lip sync; User study; Deepfakes; Face swap; Lip sync; Användarstudie;

    Sammanfattning : The term “deepfakes” refers to media content that has been manipulated using deep learning. This thesis project seeks to answer the question of how well humans are able to detect deepfakes. In particular, the project compares people’s ability to detect deepfakes between two different deepfake categories; face swap and lip sync. LÄS MER

  2. 2. Users Attitudes on Changing Anonymity on Social Media

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Simon Toblad; [2023]
    Nyckelord :anonymity; social media; moderation; self-moderation; accountability; safety; verification; communication; anonymitet; sociala medier; moderation; självmoderering; ansvarighet; säkerhet; verifikation; kommunikation;

    Sammanfattning : Anonymity on social media is a complex topic that has garnered attention from politicians and legislators alike. However, the opinions of end users on this matter have not been given due consideration. LÄS MER

  3. 3. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Johnson Akpotor Scott; [2022]
    Nyckelord :Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Sammanfattning : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. LÄS MER

  4. 4. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Jakob Ahokas; Jonathan Persson; [2022]
    Nyckelord :Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Sammanfattning : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. LÄS MER

  5. 5. Voice Feature Extraction Using Siamese Neural Networks for Detecting Impersonators

    Master-uppsats, Lunds universitet/Matematisk statistik

    Författare :Marlon Almström; Thi Thu Hòa Trân; [2022]
    Nyckelord :deep learning; voice impersonation; audio feature extraction; siamese neural networks; Mathematics and Statistics;

    Sammanfattning : Voice impersonation is a technique that has often been used by criminals whose goal is to avoid being identified while committing a crime. There are, however, other interesting cases where the police confronts a suspect with an incriminating recording, and the suspect would deny being the true speaker in that recording, and claim that it belonged to an expert impersonator. LÄS MER