Essays about: "ICS"

Showing result 6 - 10 of 78 essays containing the word ICS.

  1. 6. A method of detecting and predicting attack vectors based on genetic programming

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yekatierina Churakova; Oleksii Novikov; [2023]
    Keywords : MITTRE ATT CK; genetic programming; attack vectors; attack prediction;

    Abstract : This Master's thesis presents a novel approach for detecting and predicting attack vectors based on genetic programming. The proposed method utilizes a genetic algorithm to evolve a set of rules that predict attack vectors over the system based on caught indicators of compromise. READ MORE

  2. 7. Unlocking the True Value of Intellectual Capital: A Study of the Valuation Relevance of Intellectual Capital in an M&A Intensive Era

    University essay from Handelshögskolan i Stockholm/Institutionen för redovisning och finansiering

    Author : Filippa Oldenburg; Elisabeth Scharp; [2023]
    Keywords : Valuation Relevance; Value Relevance; M A; Performative; Intellectual Capital;

    Abstract : Capital market actors must understand the fundamental value-drivers in society, yet accounting standards face difficulties in capturing Intellectual Capital (IC) information. Meanwhile, the number of acquisitions is ever-growing, but research on the valuation relevance of IC in mergers and acquisitions (M&A) is lacking. READ MORE

  3. 8. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  4. 9. Replacing Investment treaty arbitration? Problems, reform, and transformation

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Sirvan Ahmadzadeh; [2022]
    Keywords : ISDS; ITA; Reform proposal; Transformative proposal; MIC; ICS.;

    Abstract : .... READ MORE

  5. 10. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks

    University essay from KTH/Datavetenskap

    Author : André Österlund; Nils Odin; [2022]
    Keywords : ;

    Abstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE