Essays about: "threat analysis"

Showing result 21 - 25 of 422 essays containing the words threat analysis.

  1. 21. Security Threats and Countermeasures for Connected Vehicles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuwei Gong; [2019]
    Keywords : Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd;

    Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE

  2. 22. Attack Modeling and Risk Assessments in Software Defined networking (SDN)

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Tanyi Frankeline; [2019]
    Keywords : SDN; Application layer; Northbound Interface; Controller; Southbound Interface; data plane OpenFlow; Threat Model; MulVAL; Attack Graph; Attack Trees; Risk Analysis;

    Abstract : Software Defined Networking (SDN) is a technology which provides a network architecture with three distinct layers that is, the application layer which is made up of SDN applications, the control layer which is made up of the controller and the data plane layer which is made up of switches. However, the exits different types of SDN architectures some of which are interconnected with the physical network. READ MORE

  3. 23. An Evaluation of Machine Learning Approaches for Hierarchical Malware Classification

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Robin Roth; Martin Lundblad; [2019]
    Keywords : Machine Learning; Hierarchical Malware Classification; Static Malware Analysis; Mnemonic N-grams;

    Abstract : With an evermore growing threat of new malware that keeps growing in both number and complexity, the necessity for improvement in automatic detection and classification of malware is increasing. The signature-based approaches used by several Anti-Virus companies struggle with the increasing amount of polymorphic malware. READ MORE

  4. 24. The security threat for Northern Ireland: In the views of six political leaders

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Lovisa Lundin Ziegler; [2019]
    Keywords : Brexit; Northern Ireland; security; EU; Irish border; Theresa May; Arlene Foster; Mary Lou McDonald; Enda Kenny; Leo Varadkar; Donald Tusk; Good Friday Agreement; Law and Political Science;

    Abstract : This thesis examines in what way Brexit is constructed as a security threat with regards to the Irish border. If the UK were to leave the EU a border would have to be installed, but installing a border between Northern Ireland and the Republic of Ireland would violate the Good Friday Agreement. READ MORE

  5. 25. Overcoming Scale Challenges in Policies Through Analysing Governance Architecture : The Case of Chemical Management Policies in Sweden

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Michelle san Martin Bucht; [2019]
    Keywords : Sustainable Development; chemical toxins; Sweden; governance; policy analysis; in-depth interviews;

    Abstract : The release of harmful chemicals into the Earth system is a threat to the survival of human societies and ecosystems. There are different types of harmful chemicals, some possess characteristics that are more harmful than others. Chemicals causing local effects have a short-term impact on the Earth system, whereas others are persistent in nature. READ MORE