Sökning: "Attack Simulations"
Visar resultat 21 - 25 av 52 uppsatser innehållade orden Attack Simulations.
21. Measuring Coverage of Attack Simulations on MAL Attack Graphs
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. LÄS MER
22. HypervisorLang : Attack Simulations of the OpenStack Nova Compute Node
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Cloud services are growing in popularity and the global public cloud services are forecasted to increase by 17% in 2020[1]. The popularity of cloud services is due to the improved resource allocation for providers and simplicity of use for the customer. LÄS MER
23. Aerodynamic Performance Analysis of a UAV using CFD and VLM
Master-uppsats, Linköpings universitet/Mekanisk värmeteori och strömningsläraSammanfattning : Computational Fluid Dynamics has become a versatile product development tool, bringing many advantages to the conceptual design phase of products, and is being used for a wide variety of applications. In this thesis, the aerodynamics of a UAV with internal radar has been investigated. LÄS MER
24. Validating enterpriseLang : A Domain- Specific Language Derived from the Meta Attack Language Framework
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Enterprise data systems are continuously growing in complexity and size. The attack area of these systems has increased and introduced new vulnerabilities a potential adversary could exploit. Evaluating cyber security in enterprise IT infrastructure is difficult and expensive. LÄS MER
25. Enriching Attack Models with Cyber Threat Intelligence
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. LÄS MER