Essays about: "Computer-systems security"

Showing result 1 - 5 of 28 essays containing the words Computer-systems security.

  1. 1. Developing High level Behaviours for the Boston Dynamics Spot Using Automated Planning

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : Nisa Andersson; [2023]
    Keywords : Automated Planning; Boston Dynamics Spot; Public Safety; Automatic System; Collaborative Systems; Robotics;

    Abstract : Over the years, the Artificial Intelligence and Integrated Computer Systems (AIICS) Division at Linköping University has developed a high-level architecture for collaborative robotic systems that includes a delegation system capable of defining complex missions to be executed by a team of agents. This architecture has been used as a part of a research arena for developing and improving public safety and security using ground, aerial, surfaceand underwater robotic systems. READ MORE

  2. 2. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  3. 3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  4. 4. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  5. 5. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Hugo Andersson; Per Andersson; [2023]
    Keywords : CTF; Capture the flag;

    Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE