Essays about: "cyberattacker"
Showing result 6 - 10 of 65 essays containing the word cyberattacker.
-
6. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
7. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE
-
8. Analysis, evaluation, measurements and implementation of network security systems and their critical points of failure during COVID-19
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This study analyses the evolution of the COVID-19 pandemic from a cybersecurity perspective, highlighting the different types of cyber-attacks experienced that happened around the world. In addition, this thesis shows the different types of cyber-attacks produced due to the lack of security employed during the pandemic crisis and how were the reactions of the different organizations to solving the problem. READ MORE
-
9. Exploring the Use of Blockchain Technology to Address Cybersecurity Risks in Banking and Finance
University essay from KTH/Hälsoinformatik och logistikAbstract : The growing reliance on digital services has led to an escalation in cyber risks and attacks targeting banks and financial institutions. Such cyber threats necessitate innovative solutions. But to achieve it, one needs to overcome the challenges of seeking reliable information on utilizing blockchain technology to combat cyber-attacks. READ MORE
-
10. Strategies of Honeypot Placement in Cyberspace
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In order to improve cyber security and deceive potential attackers, strategies forcyber defense must be developed and continuously improved. The purpose of thisarticle was to investigate how to protect an organization against cyberattackscontrolled by humans. READ MORE