Essays about: "Attack Graphs"

Showing result 16 - 20 of 30 essays containing the words Attack Graphs.

  1. 16. Identifying Patterns in MAL Languages

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nagasudeep Vemula; [2021]
    Keywords : ;

    Abstract : With the advent of the digital era there has been an exponential increase in complex cyber systems.As our everyday lives are increasingly being spent on the digital world as much as the physical world or even sometimes more, there is an increased risk of cyber threats or breaches which can lead to loss of data, financial damage or even at its extreme threaten our security and lives. READ MORE

  2. 17. Evaluating Robustness of a CNN Architecture introduced to the Adversarial Attacks

    University essay from Blekinge Tekniska Högskola

    Author : Shaik Ishak; Anantaneni Jyothsna Chowdary; [2021]
    Keywords : Convolutional Neural Network CNN ; Image classification; Adversarial attacks; Defensive Distillation.;

    Abstract : Abstract: Background: From Previous research, state-of-the-art deep neural networks have accomplished impressive results on many images classification tasks. However, adversarial attacks can easily fool these deep neural networks by adding little noise to the input images. READ MORE

  3. 18. Measuring Coverage of Attack Simulations on MAL Attack Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nicklas Hersén; [2021]
    Keywords : ;

    Abstract : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. READ MORE

  4. 19. Enriching Attack Models with Cyber Threat Intelligence

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Gylling; [2020]
    Keywords : ;

    Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE

  5. 20. Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Willem van der Schoot; [2020]
    Keywords : ;

    Abstract : Today’s vehicles are incredibly complex devices with vast networks of integratedelectronics and connectivity. This has led to improved safety, fuel efficiencyand comfort. However, with more electronics and connectivity comesan ever-increasing attack surface for adversaries to exploit. READ MORE