Essays about: "Cyberattack detection"
Showing result 1 - 5 of 6 essays containing the words Cyberattack detection.
-
1. A method of detecting and predicting attack vectors based on genetic programming
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This Master's thesis presents a novel approach for detecting and predicting attack vectors based on genetic programming. The proposed method utilizes a genetic algorithm to evolve a set of rules that predict attack vectors over the system based on caught indicators of compromise. READ MORE
-
2. Data-driven cyberattack detection for microgrids
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Microgrids are undergoing higher penetrations of renewables and associated power electronics, along with precise and sophisticated control and communication networks. However, such cyber-physical systems might suffer from potential cybersecurity threats and inherent low inertia. READ MORE
-
3. Cyber resilience for critical infrastructure : A systematic review
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE
-
4. C&C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. READ MORE
-
5. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE