Sökning: "security assessment"
Visar resultat 21 - 25 av 117 avhandlingar innehållade orden security assessment.
21. Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems
Sammanfattning : Today’s software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty. Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence, while their consequences are often severe. LÄS MER
22. Mobile Device Security with ARM TrustZone
Sammanfattning : Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as nancial and healthcare institutions oer services to their clients using smartphone applications (apps). Many of these apps run on Android, the most adopted mobile operating system (OS) today. LÄS MER
23. Assessing the sustainability of bioethanol production in different development contexts: A systems approach
Sammanfattning : The continuous depletion of fossil fuel reserves, the global agenda on climate change and threats to energy security have led to increased global interest in the exploration, production and utilisation of bioenergy and biofuels. Access to modern bioenergy carriers derived from the efficient conversion of locally available biomass resources is indispensable for economic growth, rural development and sustainable development in developing countries. LÄS MER
24. Power System Security Assessment - Application of Learning Algorithms
Sammanfattning : The last years blackouts have indicated that the operation and control of power systems may need to be improved. Even if a lot of data was available, the operators at different control centers did not take the proper actions in time to prevent the blackouts. LÄS MER
25. Guesswork and Entropy as Security Measures for Selective Encryption
Sammanfattning : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. LÄS MER