Essays about: "thesis on cyber security"
Showing result 6 - 10 of 132 essays containing the words thesis on cyber security.
-
6. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
7. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE
-
8. Asserting password crackers ability to target Swedish passwords : An analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In today's digital world, passwords are the keys that unlock our online lives, keeping our social media, financial accounts, and streaming services secure. Unfortunately, this makes password information a prime target for hackers, who can gain access to our entire digital existence. READ MORE
-
9. Introducing Quantum Computation in Education
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Quantum Computation is the quest for more efficient technologies. It can in principal be applied to Complex quantum systems, Quantum chemical systems, Cyber-security, Finance and AI. However, the introductory course in Quantum Mechanics at the Luleå University of Technology (F0047T) does not provide an introduction to Quantum Computation. READ MORE
-
10. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. READ MORE