Essays about: "cybersäkerhet"

Showing result 6 - 10 of 91 essays containing the word cybersäkerhet.

  1. 6. Cybersecurity: Digital Twins in Automotive Industry : The Road Ahead – An Exploratory Study

    University essay from Högskolan Väst/Institutionen för ekonomi och it

    Author : Rossarin Upara; [2023]
    Keywords : Digital Twin; Cybersecurity; Automotive Industry; Digitization; Threat Analysis; Risk Assessment; TARA; Digital Tvilling; Cybersäkerhet; Bilindustrin; Digitalisering; Hotanalys; Riskbedömning; TARA;

    Abstract : The digital twin is a concept that has attracted the attention of both industry and academia in the last decade with the advent of Industry 4.0 and the adoption of future technologies. READ MORE

  2. 7. An initial investigation of Automatic Program Repair for Solidity Smart Contracts with Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Cruz; [2023]
    Keywords : Automatic Program Repair; APR; Large Language Models; LLM; Smart Contracts; Smart Contract Audit; Chat GPT; Cybersecurity; Automatisk Lagning av Kod; Stora språkmodeller; Smarta Kontrakt; Granskning av Smarta Kontrakt; Chat GPT; Cybersäkerhet;

    Abstract : This thesis investigates how Large Language Models can be used to repair Solidity Smart Contracts automatically through the main contribution of this thesis, the Transformative Repair Tool. The Transformative Repair Tool achieves similar results to current state-of-the-art tools on the Smartbugs Curated Dataset and is the first published tool that uses Large Language Models to repair Solidity Smart Contracts. READ MORE

  3. 8. Cyber Security Risks and Opportunities of Artificial Intelligence: A Qualitative Study : How AI would form the future of cyber security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Martin Kirov; [2023]
    Keywords : AI; Cyber Security; qualitative research; semi-structured interviews; perceptions; risks; opportunities; ethical considerations; legal implications; responsible AI deployment.;

    Abstract : Cybercriminals' digital threats to security are increasing, and organisations seek smarter solutions to combat them. Many organisations are using artificial intelligence (AI) to protect their assets. READ MORE

  4. 9. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 10. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE