Essays about: "ICS"
Showing result 6 - 10 of 78 essays containing the word ICS.
-
6. A method of detecting and predicting attack vectors based on genetic programming
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : This Master's thesis presents a novel approach for detecting and predicting attack vectors based on genetic programming. The proposed method utilizes a genetic algorithm to evolve a set of rules that predict attack vectors over the system based on caught indicators of compromise. READ MORE
-
7. Unlocking the True Value of Intellectual Capital: A Study of the Valuation Relevance of Intellectual Capital in an M&A Intensive Era
University essay from Handelshögskolan i Stockholm/Institutionen för redovisning och finansieringAbstract : Capital market actors must understand the fundamental value-drivers in society, yet accounting standards face difficulties in capturing Intellectual Capital (IC) information. Meanwhile, the number of acquisitions is ever-growing, but research on the valuation relevance of IC in mergers and acquisitions (M&A) is lacking. READ MORE
-
8. Honeypot study of threats targeting critical infrastructure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE
-
9. Replacing Investment treaty arbitration? Problems, reform, and transformation
University essay from Uppsala universitet/Juridiska institutionenAbstract : .... READ MORE
-
10. Vulnerabilities in Swedish Industrial Control Systems : An examination and classification of remotely discoverable ICS devices in Sweden, and an assessment of their vulnerability to cyber attacks
University essay from KTH/DatavetenskapAbstract : Over the last couple of years, more and more industrial control systems (ICS) have been designed to be connected to the internet to allow for remote control and monitoring of industrial processes. This have opened a possibility for hackers to exploit weaknesses in such systems remotely through the internet. READ MORE