Essays about: "Attack Graphs"
Showing result 16 - 20 of 30 essays containing the words Attack Graphs.
-
16. Identifying Patterns in MAL Languages
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the advent of the digital era there has been an exponential increase in complex cyber systems.As our everyday lives are increasingly being spent on the digital world as much as the physical world or even sometimes more, there is an increased risk of cyber threats or breaches which can lead to loss of data, financial damage or even at its extreme threaten our security and lives. READ MORE
-
17. Evaluating Robustness of a CNN Architecture introduced to the Adversarial Attacks
University essay from Blekinge Tekniska HögskolaAbstract : Abstract: Background: From Previous research, state-of-the-art deep neural networks have accomplished impressive results on many images classification tasks. However, adversarial attacks can easily fool these deep neural networks by adding little noise to the input images. READ MORE
-
18. Measuring Coverage of Attack Simulations on MAL Attack Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. READ MORE
-
19. Enriching Attack Models with Cyber Threat Intelligence
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As cyber threats continue to grow and expertise resources are limited, organisationsneed to find ways to evaluate their resilience efficiently and takeproactive measures against an attack from a specific adversary before it occurs.Threat modelling is an excellent method of assessing the resilience of ICT systems,forming Attack (Defense) Graphs (ADGs) that illustrates an adversary’sattack vectors, allowing analysts to identify weaknesses in the systems. READ MORE
-
20. Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s vehicles are incredibly complex devices with vast networks of integratedelectronics and connectivity. This has led to improved safety, fuel efficiencyand comfort. However, with more electronics and connectivity comesan ever-increasing attack surface for adversaries to exploit. READ MORE