Advanced search

Showing result 1 - 5 of 36 essays matching the above criteria.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  3. 3. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  4. 4. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  5. 5. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandor Berglund; [2022]
    Keywords : Attack graphs; reinforcement learning; graph neural networks; Meta Attack Language; MAL; deepQ-learning DQN ; Attackgrafer; förstärningsinlärning; artificiella neuronnät; grafneuronnät; djup Qinlärning; Meta Attack Language; MAL;

    Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE