Essays about: "Information security art"

Showing result 1 - 5 of 39 essays containing the words Information security art.

  1. 1. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  2. 2. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  3. 3. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  4. 4. Cell Tower Localization using crowdsourced measurments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Escandón Álvarez; [2023]
    Keywords : Cell Tower Geolocation; Crowdsourced Measurements; Positioning; Machine Learning; Neural Networks;

    Abstract : This thesis explores the application of a neural network approach to cell tower localization using crowdsourced measurements. The deployment of cell tower infrastructure has been increasing exponentially in recent times as it is a crucial element of mobile communications. READ MORE

  5. 5. The ideal use of NFT in Metaverse - A Systematic literature review

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Khalil Al-Towhi; [2023]
    Keywords : metaverse; scams; fraud; NFT; smart contract; oracle nodes; blockchain; systematic literature review;

    Abstract : It has become possible to say that the metaverse is a great opportunity for investment and trade, as it provides massive financial returns. The metaverse is the next evolution in social connection and the successor to the mobile internet. READ MORE