Essays about: "Attack simulering"
Showing result 6 - 10 of 14 essays containing the words Attack simulering.
-
6. Digital Twin-based Intrusion Detection for Industrial Control Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Digital twins for industrial control systems have gained significant interest over recent years. This attention is mainly because of the advanced capabilities offered by digital twins in the areas of simulation, optimization, and predictive maintenance. READ MORE
-
7. Measuring Coverage of Attack Simulations on MAL Attack Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. READ MORE
-
8. Detecting ADS-B spoofing attacks : using collected and simulated data
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In a time where general technology is progressing at a rapid rate, this thesis aims to present possible advancements to security in regard to air traffic communication. By highlighting how data can be extracted using simple hardware and open-source software the transparency and lack of authentication is showcased. READ MORE
-
9. Simulating ADS-B and CPDLC messages with SDR
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Several studies have shown insufficient security in air traffic communication. The increase in air traffic in recent years also increases the need for improved security. CPDLC is used to communicate in text over the data link and ADS-B determines the position of an aircraft. These techniques are looked upon and simulated in the thesis. READ MORE
-
10. vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the literature. READ MORE