Essays about: "Networks attacks"
Showing result 1 - 5 of 179 essays containing the words Networks attacks.
-
1. EVALUATING CRYSTAL FRAMEWORK IN PRACTICE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Cyber-physical systems (CPSs) are used in several industries, such as healthcare, automotive, manufacturing, and more. The fact that CPSs often contain components integrated via communication networks means that malicious actors can exploit vulnerabilities in these components through cyber attacks. READ MORE
-
2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
4. Adversarial robustness of STDP-trained spiking neural networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Adversarial attacks on machine learning models are designed to elicit the wrong behavior from the model. One such attack on image classifiers are maliciously crafted inputs that, to the human eye, look untampered with but have been carefully altered to cause misclassification. READ MORE
-
5. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE