Sökning: "malware"

Visar resultat 11 - 15 av 119 uppsatser innehållade ordet malware.

  1. 11. Evaluation of machine learning models for classifying malicious URLs

    Uppsats för yrkesexamina på grundnivå, Högskolan i Gävle/Datavetenskap

    Författare :Shayan Abad; Hassan Gholamy; [2023]
    Nyckelord :Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Sammanfattning : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. LÄS MER

  2. 12. Detektionsmetoder för skadlig kod i IoT-baserat smart hem : En systematisk litteraturstudie

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :William Saxmark; [2023]
    Nyckelord :Malware; botnet; detection; IoT; smart home; methods; Skadlig kod; botnät; detektion; IoT; smarta hem; metoder;

    Sammanfattning : IoT devices are being widely deployed within smart homes. Most of these devices are mass-produced at a low cost. As a result, due to the lack of security mechanisms, IoT devices become vulnerable to malware. LÄS MER

  3. 13. Edge Computing Security for IoT : A Systematic Literature Review

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Albin Johnsson; Adam Nordling; [2023]
    Nyckelord :;

    Sammanfattning : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. LÄS MER

  4. 14. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ramtin Erfani Torbaghani; [2023]
    Nyckelord :Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER

  5. 15. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Nyckelord :Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Sammanfattning : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. LÄS MER