Sökning: "Attack Simulations"
Visar resultat 6 - 10 av 52 uppsatser innehållade orden Attack Simulations.
6. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. LÄS MER
7. Active flow control of the turbulent boundary layer over a NACA4412 wing profile for skin friction drag reduction
Master-uppsats, KTH/Teknisk mekanikSammanfattning : In the context of building a framework for active flow control of turbulent boundary layers in wings, a set of large-eddy simulation (LES) are implemented in OpenFOAM. The flow around a NACA4412 wing profile is simulated at 5° angle of attack and Re_c = 400˙000. LÄS MER
8. Implementing and evaluating variations of the Blackhole attack on RPL
Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. LÄS MER
9. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). LÄS MER
10. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. LÄS MER