Essays about: "enumerate"

Showing result 1 - 5 of 8 essays containing the word enumerate.

  1. 1. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Willem Brahmstaedt; Eira Höglund; Caspian Kullgren; Simon Larsson; Hanna Schaff; Johanna Thall; [2023-03-03]
    Keywords : operational technology; cybersecurity standards; containerization; computer aided process optimization; software development; application; web server;

    Abstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE

  2. 2. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  3. 3. Explainable Product Configuration for Telecom via Constraint Reasoning

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Paul Häusner; [2022]
    Keywords : ;

    Abstract : Product Configuration is one of the most successful applications of Artificial Intelligence and is widely adopted in industry. Nowadays,intelligent systems not only have to be able to generate outputs but these outputs are desired to be understandable and interpretable to humans. READ MORE

  4. 4. DNS Enumeration Techniques and Characterizing DNS vulnerabilities

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Genet Thorsell; [2022]
    Keywords : DNS security; DNS Enumeration; DNS vulnerabilities;

    Abstract : The Domain Name System is a worldwide global service, considered to be the heart and soul of the internet, that is used for mapping IP addresses to a hostname and vice-versa. Despite the fact that DNS is recognized as a critical internet service, the security aspects concerning its adoption are still highly neglected. READ MORE

  5. 5. Detecting Cycles in GraphQL Schemas

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Kieron Soames; Jonas Lind; [2019]
    Keywords : GraphQL; Simple Cycles; Cycles; Algorithm; Algorithms; Johnson; Tarjan; Weinblatt; Tiernan; JavaScript; Graph; Vertex; Vertices; Path; Strongly Connected Components; SCC; Cyclicity; Database;

    Abstract : GraphQL is a database handling API created by Facebook, that provides an effective al-ternative to REST-style architectures. GraphQL provides the ability for a client to spec-ify exactly what data it wishes to receive. READ MORE