Essays about: "cybersecurity learning"

Showing result 1 - 5 of 20 essays containing the words cybersecurity learning.

  1. 1. Risky Business: Quantitative Risk Assessments as Enabling Devices in Cybersecurity

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Colette Alexander; [2024]
    Keywords : Quantitative risk assessment; cybersecurity; enabling device; Technology and Engineering;

    Abstract : Quantitative risk assessment (QRA) is a growing practice in the cybersecurity field. This paper examines QRA the use in various industries and the problems with its use. The focus of the qualitative research is to understand why cybersecurity organizations might want to use QRA even if it produces untrue and potentially problematic results. READ MORE

  2. 2. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  3. 3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  4. 4. Neural Networks for Predictive Maintenance on Highly Imbalanced Industrial Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Oscar Montilla Tabares; [2023]
    Keywords : Class Imbalance; Cost Sensitivity; Cost-Sensitive Learning; Focal Loss; Binary Classification; Machine Learning; Deep Learning;

    Abstract : Preventive maintenance plays a vital role in optimizing industrial operations. However, detecting equipment needing such maintenance using available data can be particularly challenging due to the class imbalance prevalent in real-world applications. READ MORE

  5. 5. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE