Sökning: "brute-force method"

Visar resultat 1 - 5 av 22 uppsatser innehållade orden brute-force method.

  1. 1. PVCFA: Principal Variation Context Feature Attribution : Distributed Chess for Perturbation-based Saliency Maps

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Marco Molinari; [2023]
    Nyckelord :Chess; Perturbation; Saliency maps; Multiagent; Reinforcement Learning; Schack; Perturbation; Saliency maps; Multiagent; Reinforcement Learning;

    Sammanfattning : The research and development field of computer chess improved more in the last 5 years than in the whole history of computers. Unfortunately these unprecedented results comes with techniques that don’t leave much space to intuition and comprehensibility for humans. LÄS MER

  2. 2. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ramtin Erfani Torbaghani; [2023]
    Nyckelord :Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER

  3. 3. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER

  4. 4. A heuristic approach to screw pose detection

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Emil Ransed; [2022]
    Nyckelord :;

    Sammanfattning : Object detection using vision systems could generally be accomplished using machine learning or conventional computer vision techniques. This thesis implements and compares three methods to locate screws on a flat plane using conventional computer vision on regular non stereo images without any depth or range information. LÄS MER

  5. 5. Full Configuration Interaction Model for 1-D Quantum System

    Kandidat-uppsats, Lunds universitet/Matematisk fysik; Lunds universitet/Fysiska institutionen

    Författare :Adam Asaad; [2022]
    Nyckelord :Physics and Astronomy;

    Sammanfattning : The many-body problem is one of the most challenging problems in physics due to the complexity emerging from the interactions of many quantum particles. Since the advent of computers with increasing power, computational methods have been very successful in providing insight and precise solutions to this problem. LÄS MER