Advanced search
Showing result 1 - 5 of 78 essays matching the above criteria.
-
1. Active learning for text classification in cyber security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE
-
2. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
3. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE
-
4. Security awareness training : Impact of security awareness training on employee attitudes, behaviors, and organizational cybersecurity: A study in medium-sized companies
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This research study investigates the efficacy of security awareness training programs in managing information security threats. Through a systematic literature review (SLR) and multiple interviews, the research explains the interplay between employees' security knowledge, attitudes, and behaviors in the context of these training programs. READ MORE
-
5. Testing data logging tools in DataOps for Digital Twins
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Industry 4.0 and a global trend in digital transformation have brought new ideas and emerging technologies to the surface. Data has become a key asset for businesses, and streamlining data and automating data life cycles have become increasingly important. READ MORE