Essays about: "Malicious"

Showing result 16 - 20 of 257 essays containing the word Malicious.

  1. 16. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  2. 17. Assessing Ransomware Mitigation Strategies in Swedish Organizations: A Focus on Phishing Emails

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Johan Liedgren; Felix von Bonsdorff; [2023]
    Keywords : Ransomware; ransomware mitigation; phishing; phishing emails; malware prevention strategies;

    Abstract : Ransomware has been a growing threat to today's organizations, with irreparable damages and billions of dollars lost, it is crucial for organizations to implement mitigation strategies that can counter these attacks. With phishing attempts being the primary attack vector, it is evident that organizations need to implement the best practices in order to avoid the consequences. READ MORE

  3. 18. Outlier Robustness in Server-Assisted Collaborative SLAM : Evaluating Outlier Impact and Improving Robustness

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : José Miguel de Almeida Pedro; [2023]
    Keywords : SLAM; Robust Estimation; Multi-Device Algorithms; SLAM; Robust uppskattning; Algoritmer för flera enheter;

    Abstract : In order to be able to perform many tasks, autonomous devices need to understand their environment and know where they are in this environment. Simultaneous Localisation and Mapping (SLAM) is a solution to this problem. READ MORE

  4. 19. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE

  5. 20. Are Distributed Representations in Neural Networks More Robust Against Malicious Fooling Attacks

    University essay from Högskolan Dalarna/Institutionen för information och teknik

    Author : Nida Sardar; Sundas Khan; [2023]
    Keywords : Adversarial attacks; Information Smearedness; Artificial Neural Networks; Information Relay; Dropout; Fast Gradient Sign Method;

    Abstract : A plethora of data from sources like IoT, social websites, health, business, and many more have revolutionized the digital world in recent years. To make effective use of data for any sort of analysis, prediction, or automation of applications, the demand for machine learning and artificial intelligence has grown over time. READ MORE