Essays about: "Attack Trees."

Showing result 11 - 15 of 33 essays containing the words Attack Trees..

  1. 11. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE

  2. 12. A Framework for Secure Structural Adaptation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Goran Saman Nariman; [2018]
    Keywords : Self-Adaptive System; Adaptive System; Security; Threat Models; Security Metrics; Structural Adaptation; Reconfiguration Plan; Security Level; Graph-based Threat Models; Dynamic Reconfiguration; Structural Reconfiguration; Attack Graphs; T-HARM; Attack Trees; Attack Graphs Generation; MulVAL;

    Abstract : A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment or the system itself. From a security standpoint, there has been some research pertaining to (self-) adaptive systems in general but not enough care has been shown towards the adaptation itself. READ MORE

  3. 13. Implementing Bayesian Networks for online threat detection

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Mauro José Pappaterra; [2018]
    Keywords : Cybersecurity; Bayesian Networks; Threat Detection; Attack Trees; DETECT; Risk Evaluation; Threat Assessment; CPS;

    Abstract : Cybersecurity threats have surged in the past decades. Experts agree that conventional security measures will soon not be enough to stop the propagation of more sophisticated and harmful cyberattacks. READ MORE

  4. 14. Are birds in agricultural habitats attracted to plant volatiles?

    University essay from SLU/Dept. of Ecology

    Author : Malin Leidefors; [2018]
    Keywords : insectivorous birds; avian olfaction; foraging; herbivore-induced volatiles; pest control;

    Abstract : Birds’ ability to fly allows them to track resource abundance and relocate themselves to areas with more resources. It has been a longstanding belief that they forage mainly through visual cues due to their relatively small olfactory bulbs. READ MORE

  5. 15. Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Anton Sundblad; Gustaf Brunberg; [2017]
    Keywords : tee; information security; hypervisor; attack trees; fault trees;

    Abstract : Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. READ MORE