- document
-
van Hal, Sven (author)The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly capable cyber actors breach secure networks at a worrying scale. While network monitoring and analysis should identify blatant data exfiltration attempts, covert channels bypass these measures and facilitate surreptitious information extraction. The...master thesis 2021
- document
-
Pathak, Chinmay (author)Anomaly detection is a task of interest in many domains. Typical way of tackling this problem is using an unsupervised way. Recently, deep neural network based density estimators such as Normalizing flows have seen a huge interest. The ability of these models to do the exact latent-variable inference and exact log-likelihood calculation with...master thesis 2019