Essays about: "attack graph"
Showing result 1 - 5 of 27 essays containing the words attack graph.
-
1. Evaluating Security Mechanisms of Substation Automation Systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE
-
2. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE
-
4. HackerGraph : Creating a knowledge graph for security assessment of AWS systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE
-
5. Analysis of Flow Prolongation Using Graph Neural Network in FIFO Multiplexing System
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network Calculus views a network system as a queuing framework and provides a series of mathematical functions for finding an upper bound of an end-to-end delay. It is crucial for the design of networks and applications with a hard delay guarantee, such as the emerging Time Sensitive Network. READ MORE