Avancerad sökning
Visar resultat 1 - 5 av 119 uppsatser som matchar ovanstående sökkriterier.
1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. LÄS MER
2. Android Malware Detection Using Machine Learning
Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. LÄS MER
3. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. LÄS MER
4. Third-party risks in industrial control systems: : A case study in the wind power sector
Master-uppsats, KTH/Skolan för industriell teknik och management (ITM)Sammanfattning : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. LÄS MER
5. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. LÄS MER