Essays about: "attack simulering"
Showing result 1 - 5 of 14 essays containing the words attack simulering.
-
1. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE
-
2. Smart Attack Detection for IoT Networks
University essay from KTH/Kommunikationssystem, CoSAbstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE
-
3. Simulating ADS-B vulnerabilities by imitating aircrafts : Using an air traffic management simulator
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Air traffic communication is one of the most vital systems for air traffic management controllers. It is used every day to allow millions of people to travel safely and efficiently across the globe. READ MORE
-
4. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. READ MORE
-
5. Formalise Defense Strategies in Design Patterns of Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE