Essays about: "Malicious"
Showing result 16 - 20 of 257 essays containing the word Malicious.
-
16. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE
-
17. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. READ MORE
-
18. Outlier Robustness in Server-Assisted Collaborative SLAM : Evaluating Outlier Impact and Improving Robustness
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In order to be able to perform many tasks, autonomous devices need to understand their environment and know where they are in this environment. Simultaneous Localisation and Mapping (SLAM) is a solution to this problem. READ MORE
-
19. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE
-
20. Are Distributed Representations in Neural Networks More Robust Against Malicious Fooling Attacks
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : A plethora of data from sources like IoT, social websites, health, business, and many more have revolutionized the digital world in recent years. To make effective use of data for any sort of analysis, prediction, or automation of applications, the demand for machine learning and artificial intelligence has grown over time. READ MORE