Sökning: "security exploit"

Visar resultat 1 - 5 av 121 uppsatser innehållade orden security exploit.

  1. 1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE

    Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknik

    Författare :Victor Mertala; Nordin Christopher; [2024]
    Nyckelord :CRYSTAL Framework; Tiny Twin; Tiny Digital Twin; Rebeca; Timed Rebeca; monitor; cyber attacks;

    Sammanfattning : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. LÄS MER

  2. 2. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ivan Baheux; [2023]
    Nyckelord :Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Sammanfattning : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. LÄS MER

  3. 3. Recognizing and Defending Against Phishing Attacks in Large Organizations

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Matay Mayrany; [2023]
    Nyckelord :Security; Email; Phishing; Social Engineering; Educational Training Programs; Säkerhet; e-post; nätfiske; social teknik; utbildningsprogram;

    Sammanfattning : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. LÄS MER

  4. 4. Harnessing Hydrogen and Batteries: Hybrid Energy Storage System for Versatile and Profitable Renewable Power Production

    Uppsats för yrkesexamina på avancerad nivå, Lunds universitet/Industriell elektroteknik och automation

    Författare :Nora Jaredson Lilja; Hugo Björling; [2023]
    Nyckelord :Energy storage; Hydrogen energy storage; Battery storage; Hybrid storage; Wind power; Solar power; Combined wind and solar power production; Variable renewable energy sources; Power management; Energy storage operational strategy; Plannable renewable power production; Technology and Engineering;

    Sammanfattning : This thesis explores the integration of hydrogen and battery energy storage systems as a means to enhance the management of wind and solar power in the pursuit of a greener grid. The objective of the study is to identify the potential benefits and challenges associated with hybrid energy storage systems (HESS) and their role in renewable energy integration. LÄS MER

  5. 5. Vulnerability Management of Open-Source Libraries

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Författare :Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Nyckelord :vulnerability management; software security; open-source software.;

    Sammanfattning : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. LÄS MER