Essays about: "cyber security"
Showing result 16 - 20 of 295 essays containing the words cyber security.
-
16. The Digitalization of the Electricity System : Impact Assessment of Digital Technologies on the Electricity System and its Main Stakeholders
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This work explores the state of digitalization of the European electricity sector and assesses the impacts of digital technologies on the electricity system and its main stakeholders. Digital technologies, such as smart meters and 5G connectivity, represent a powerful tool for system operators to face the new challenges brought about by the decarbonization of the energy sector. READ MORE
-
17. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE
-
18. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
19. The social production of vulnerabilities online : A Tale about digitalised disaster
University essay from FörsvarshögskolanAbstract : This thesis aims to display how disastrous events in the cyber domain can be understood to have root causes attributed to non-technical vulnerabilities. The goal is to show the accelerating importance in understanding the cyber domain as any other societal arena. READ MORE
-
20. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE