Sökning: "computer security"

Visar resultat 1 - 5 av 295 uppsatser innehållade orden computer security.

  1. 1. Identifiera löv i skogar – Att lära en dator känna igen löv med ImageAI

    Uppsats för yrkesexamina på grundnivå, Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Författare :My Nordqvist; [2019]
    Nyckelord :SCA; Machine learning; Neural networks; Deep learning; Forest classification; Leaf; Orthophoto; Python; TensorFlow; ImageAI; SCA; Maskininlärning; Neurala nätverk; Djuplärning; Klassificering av skog; Löv; Ortofoton; Python; TensorFlow; ImageAI;

    Sammanfattning : A current field of research today is machine learning because it can simplify everyday life for human beings. A functioning system that has learned specific tasks can make it easier for companies in both cost and time. A company who want to use machine learning is SCA, who owns and manages forests to produce products. LÄS MER

  2. 2. Privacy concerns in Ambient Assisted Living systems for home environments

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mikael Söderqvist; [2019]
    Nyckelord :;

    Sammanfattning : By 2060 it is estimated that 30% of the European population will be 60 years or older. An aging society will put a heavy strain on the healthcare system. To mitigate this strain and enable elderly to live autonomously in their homes the AAL program was formed. LÄS MER

  3. 3. Mitigation of inter-domain Policy Violations at Internet eXchange Points

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Muhammad Raheem; [2019]
    Nyckelord :IXP; Computer Networks; Distributed Systems; SDN; OpenFlow; BGP; Open vSwitch; Security; Firewall; Monitoring; IXP; Datornätverk; Distribuerade System; SDN; OpenFlow; BGP; Open vSwitch; Säkerhet; Brandvägg; Övervakning;

    Sammanfattning : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. LÄS MER

  4. 4. Evaluating Compromising Emanations in Touchscreens

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Joakim Lidstedt; [2019]
    Nyckelord :Compromising emanations; Tempest; Touchscreen; Van Eck phreaking; Conducted emanations; Radiated emanations; Information Security; IT Security; Röjande signaler; Pekskärm; Informationssäkerhet; IT-Säkerhet;

    Sammanfattning : In a short time touchscreens has become one of the most used methods for input to smartphones and other machines such as cash registers, card terminals and ATMs. While the technology change was quick it introduces the possibility of new security holes. Compromising emanations is a possible security hole in almost all electronic equipment. LÄS MER

  5. 5. Automatic secret synchronisation across heterogeneous IT environments

    M1-uppsats, KTH/Hälsoinformatik och logistik; KTH/Hälsoinformatik och logistik

    Författare :Johan Wedin; Filip Ek Johansson; [2019]
    Nyckelord :security; secrets; secret management; system integration; cryptography; computer security; säkerhet; hemligheter; hemlighetshantering; systemintegration; kryptografi; datasäkerhet;

    Sammanfattning : Following circumstances such as mergers and acquisitions, the IT systemsassociated with the participating organisations may need to share access towardsservices and systems with eachother. Access towards systems and services is oftencontrolled using secret information such as passwords or keys. LÄS MER