Essays about: "Attack Graphs"
Showing result 6 - 10 of 30 essays containing the words Attack Graphs.
-
6. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE
-
7. Security Analysis of Volvo’s Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE
-
8. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE
-
9. Learning Policies for Path Selection in Attack Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE
-
10. Early-stage detection of bark beetle infested spruce forest stands using Sentinel-2 data and vegetation indices
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : The European spruce bark beetle is an insect that is often referred to as a pest. Responsible for the destruction of over 150 million m3 of Norwegian spruce forest in Europe over the last 50 years makes this insect one of the major disturbances to the forest industry. READ MORE