Essays about: "Cyber defense"

Showing result 1 - 5 of 27 essays containing the words Cyber defense.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  2. 2. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  3. 3. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  4. 4. Strategies of Honeypot Placement in Cyberspace

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Madeleine Lindström; Samuel Lavebrink; [2023]
    Keywords : ;

    Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE

  5. 5. Enhancing an Existing Attack Projection System with Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mikael Kolanowski; [2023]
    Keywords : Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Abstract : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. READ MORE