Searched for: +
(1 - 20 of 31)

Pages

document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Simonov, Alex (author)
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influence on different aspects of our lives. It is, however, shown that...
master thesis 2024
document
Spanninga, Paulien (author)
In recent years, the medical world has seen rapid digitalisation. Digitalisation of healthcare and the opportunities of remote monitoring can help to keep the healthcare system affordable and accessible. A promising application of remote monitoring is the use of consumer-grade wearables for clinical care. However, vulnerabilities leave consumer...
master thesis 2023
document
Bissumbhar, Josephine (author)
In a rapidly evolving digital landscape, where information is the currency of progress, universities play a vital role in fostering innovation, research, and knowledge dissemination. However, this invaluable role also exposes universities to significant cybersecurity challenges. Cybersecurity is an increasingly important topic for organisations...
master thesis 2023
document
Timmerman, Gerben (author)
This thesis offers a comprehensive exploration of log-based anomaly detection within the domain of cybersecurity incident response. The research describes a different approach and explores relevant log features for language model training, experimentation with different language models and training methodologies, and the investigation of the...
master thesis 2023
document
Gaalswijk, Jonathan (author)
Critical infrastructures, such as the energy sector, are vital for the proper functioning of society. It is crucial to protect these infrastructures against cyberattacks on their operational technology, ensuring their operational performance, and safeguarding energy safety. There is a lack of existing research on improving cybersecurity in...
master thesis 2023
document
Bahl, Robin (author)
Addressing the growing problem of phishing attacks requires nurturing a reporting culture within organizations. This research examines the factors influencing reporting behavior and the role of infrastructure & support in enhancing reporting rates. By adopting a mixed methods approach and analyzing phishing simulation logs and user...
master thesis 2023
document
Onkenhout, Job (author)
In 2019 a quantum computer performed a highly complex operation in 4 minutes, which would have taken the most powerful supercomputers of today around 10,000 years. Performing calculations unimaginably faster than is currently possible may bring great opportunities, but may implicate a threat to digital communications. Digital communication is...
master thesis 2023
document
Oosthoek, K. (author)
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly affected individuals, companies, governments and critical infrastructure. It has led to significant financial damage, impeded critical infrastructure and harmed human lives. Defending against cybercrime is difficult, as persistent actors perpetually...
doctoral thesis 2023
document
van der Boon, Mike (author)
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation responsibilities. This will happen during the transition of the current power grid to the Smart Grid. Due to the importance of this power to society, it is crucial that the grid stays stable.<br/><br/>DER devices are similar to IoT devices in scale...
master thesis 2023
document
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...
journal article 2023
document
Christiansen, L.V.C. (author), Bharosa, Nitesh (author), Janssen, M.F.W.H.A. (author)
As the development of quantum computers advances, actors relying on public key infrastructures (PKI) for secure information exchange are becoming aware of the disruptive implications. Currently, governments and businesses employ PKI for many core processes that may become insecure or unavailable when quantum computers break the cryptographic...
conference paper 2023
document
Nadeem, A. (author), Vos, D.A. (author), Cao, C.S. (author), Pajola, Luca (author), Dieck, S. (author), Baumgartner, R. (author), Verwer, S.E. (author)
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We identify 3 cybersecurity stakeholders, i.e., model users, designers,...
conference paper 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
van Veen, Tim (author)
This study investigates organizations’ approaches to managing cybersecurity challenges that are associated with high levels of teleworking. Over the last two and a half years the pandemic forced organizations to implement teleworking models that resulted in a large share of the workforce working from home. The increasing use of teleworking...
master thesis 2022
document
Joseph, Reshma (author)
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have commonly used phishing as a social engineering technique to deploy a ransomware attack. Critical infrastructures such as hospitals have been the common target of these attacks due to hospitals’ sudden increase in digitization and interconnectivity,...
master thesis 2022
document
Plas, Nicolas (author)
Software-Defined Networking (SDN) is a relatively new networking paradigm that proposes to separate the control and the data logic in networks. The control logic is centralized in a controller, which allows for a programmable network. SDN is promising but also intro- duces some critical security vulnerabilities to networks. This work proposes a...
bachelor thesis 2022
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Janssen, M.F.W.H.A. (author)
Governments are confronted with all kinds of changes in their digital environment, such as pandemics, fake news, and security breaches. These changes come with many uncertainties and are hard to predict, whereas decisions need to be made quickly to avoid a negative impact. Adaptive governance embraces uncertainty and complexity by enabling...
conference paper 2022
Searched for: +
(1 - 20 of 31)

Pages