Essays about: "thesis computer forensic"

Found 5 essays containing the words thesis computer forensic.

  1. 1. Identifying and analysing forensic artefacts of specific attacks on a Programmable Logic Controller

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rebecka Forsberg; [2022]
    Keywords : Industrial Cyber Security forensics; Programmable Logic Controller; Forensic analysis; Artefacts; Forensic readiness; Industriell cybersäkerhet forensik; Programmerbar logikkontroller; Forensik analys; Artefakter; Forensisk mogenhet;

    Abstract : In Industrial Computer Systems, Programmable Logic Controllers (PLCs) are essential components since they control physical processes. Altering these could have enormous consequences as they can control processes in nuclear plants, gas pipelines and water supplies. READ MORE

  2. 2. Transfer Learning for Automatic Author Profiling with BERT Transformers and GloVe Embeddings

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Viktor From; [2022]
    Keywords : machine learning; natural language processing; author profiling; transfer learning; reddit; twitter; glove; bert;

    Abstract : Historically author profiling has been used in forensic linguistics. However, it is not until the last decades that the analysis method has worked into computer science and machine learning. In comparison, determining author profiling characteristics in machine learning is nothing new. READ MORE

  3. 3. Honeypots in network security

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Deniz Akkaya; Fabien Thalgott; [2010]
    Keywords : Honeypot; hacking; security; forensic analysis of honeypots; network;

    Abstract : Day by day, more and more people are using internet all over the world. It is becoming apart of everyone’s life. People are checking their e-mails, surfing over internet, purchasinggoods, playing online games, paying bills on the internet etc. READ MORE

  4. 4. Contributions of honeyports to network security

    University essay from Institutionen för datavetenskap

    Author : Sagar Pepakayala; [2007]
    Keywords : Honeypot; honeynet; cyber-deception; IDS;

    Abstract : A honeypot is an attractive computer target placed inside a network to lure the attackers into it. There are many advantages of this technology, like, information about attacker's tools and techniques can be fingerprinted, malicious traffic can be diverted away from the real target etc. READ MORE

  5. 5. Unsecured sessions with ICQ : applying forensic computing

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Martin Kling; [2003]
    Keywords : ICQ; Instant Messaging; Forensic computing; Digital evidence;

    Abstract : Digital evidence is becoming more and more frequent and important in investigations carried out by the police. To make the correct judgements, the police force needs to know what one can do with ICQ and in what ways it can be exploited. This thesis aims to point out weaknesses in ICQ that can aid the police in their work. READ MORE