Essays about: "Attack Trees."
Showing result 11 - 15 of 33 essays containing the words Attack Trees..
-
11. Attack Modeling and Risk Assessments in Software Defined networking (SDN)
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE
-
12. A Framework for Secure Structural Adaptation
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment or the system itself. From a security standpoint, there has been some research pertaining to (self-) adaptive systems in general but not enough care has been shown towards the adaptation itself. READ MORE
-
13. Implementing Bayesian Networks for online threat detection
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Cybersecurity threats have surged in the past decades. Experts agree that conventional security measures will soon not be enough to stop the propagation of more sophisticated and harmful cyberattacks. READ MORE
-
14. Are birds in agricultural habitats attracted to plant volatiles?
University essay from SLU/Dept. of EcologyAbstract : Birds’ ability to fly allows them to track resource abundance and relocate themselves to areas with more resources. It has been a longstanding belief that they forage mainly through visual cues due to their relatively small olfactory bulbs. READ MORE
-
15. Secure hypervisor versus trusted execution environment : Security analysis for mobile fingerprint identification applications
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Fingerprint identification is becoming increasingly popular as a means of authentication for handheld devices of different kinds. In order to secure such an authentication solution it is common to use a TEE implementation. READ MORE