Essays about: "Malware"

Showing result 1 - 5 of 89 essays containing the word Malware.

  1. 1. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Love Andrén; [2024]
    Keywords : Threat Intelligence; Open-source; Information Sharing; Cyber Security;

    Abstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE

  2. 2. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  3. 3. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  4. 4. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 5. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE