Sökning: "secure identification"
Visar resultat 1 - 5 av 91 uppsatser innehållade orden secure identification.
1. Midwifery education in Sub- Saharan Africa – A systematic integrative literature review
Master-uppsats,Sammanfattning : Background: Maternal mortality remains a major global health concern, with the highest rate found in Sub-Saharan Africa. There is documented lack of well-trained midwives, hence, a need for increased quality midwifery education to improve maternity care and secure women's reproductive health. LÄS MER
2. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data
Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. LÄS MER
3. Evaluating intrusion detection points in an end-to-end solution
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER
4. Assessing Supply Chain Resilience to Mitigate Supply Chain Risks : A case study of the inbound logistics @ Volvo CE
Master-uppsats, Linköpings universitet/Logistik- och kvalitetsutvecklingSammanfattning : In recent years, the frequency of disruptive events in supply chains has increased. This is partly due to the fact that supply chains are more globalized and more complex, with deeper tiering among suppliers. This makes the supply chain more vulnerable to risks. LÄS MER
5. Can Developer Data Predict Vulnerabilities? : Examining Developer and Vulnerability Correlation in the Kibana Project
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Open-source software is often chosen with the expectation of increased security [1]. The transparency and peer review process of open development offer advantages in terms of more secure code. However, developing secure code remains a challenging task that requires more than just expertise. LÄS MER