Essays about: "DSL"
Showing result 11 - 15 of 41 essays containing the word DSL.
-
11. azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. READ MORE
-
12. Automated security analysis of a SCADA system
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE
-
13. Big Data Workflows: DSL-based Specification and Software Containers for Scalable Execution
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Big Data workflows are composed of multiple orchestration steps that perform different data analytics tasks. These tasks process heterogeneous data using various computing and storage resources. READ MORE
-
14. A Scala DSL for Rust code generation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Continuous Deep Analytics (CDA) is a new form of analytics with performance requirements exceeding what the current generation of distributed systems can offer. This thesis is part of a five year project in collaboration between RISE SICS and KTH to develop a next generation distributed system capable of CDA. READ MORE
-
15. azureLang: a probabilistic modeling and simulation language for cyber attacks in Microsoft Azure cloud infrastructure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An attack simulation advances step-wise from a certain systementry-point to explore the attack paths that lead to dierent weaknesses inthe model. Each step is analyzed, and the time to compromise is calculated. READ MORE