Advanced search

Showing result 1 - 5 of 78 essays matching the above criteria.

  1. 1. Active learning for text classification in cyber security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Carp; [2023]
    Keywords : Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE

  2. 2. Workflow-driven, dynamic authorization for Modular Automation systems

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Enna Basic; Ivan Radonjic; [2023]
    Keywords : industrial control systems; dynamic access control; authorization service; cyber security; modular automation;

    Abstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE

  3. 3. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  4. 4. Security awareness training : Impact of security awareness training on employee attitudes, behaviors, and organizational cybersecurity: A study in medium-sized companies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Carl-Adam Spanlang; [2023]
    Keywords : Information security; cybersecurity; security awareness training; nanolearning;

    Abstract : This research study investigates the efficacy of security awareness training programs in managing information security threats. Through a systematic literature review (SLR) and multiple interviews, the research explains the interplay between employees' security knowledge, attitudes, and behaviors in the context of these training programs. READ MORE

  5. 5. Testing data logging tools in DataOps for Digital Twins

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Adrian Bakken Sundmoen; [2023]
    Keywords : ;

    Abstract : Industry 4.0 and a global trend in digital transformation have brought new ideas and emerging technologies to the surface. Data has become a key asset for businesses, and streamlining data and automating data life cycles have become increasingly important. READ MORE