Essays about: "Attack grafer"
Showing result 1 - 5 of 10 essays containing the words Attack grafer.
-
1. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
2. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE
-
3. Security Analysis of Volvo’s Infotainment System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE
-
4. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE
-
5. Learning Policies for Path Selection in Attack Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE