Searched for: +
(1 - 20 of 33)

Pages

document
Asghari, H. (author), Van Eeten, M.J.G. (author), Arnbak, A.M. (author), Van Eijk, N.A.N.M. (author)
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the...
report 2013
document
Schmidt, A. (author)
Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful...
doctoral thesis 2014
document
Asghari, H. (author)
Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how...
doctoral thesis 2016
document
de Bruijn, J.A. (author), Janssen, M.F.W.H.A. (author)
Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governments, but requiring the involvement of individuals. Although cybersecurity is one of the most important challenges faced by governments today, the visibility and public awareness remains limited. Almost everybody has heard of cybersecurity,...
journal article 2017
document
de Vries, Jennie (author)
One of the leading perspectives from literature is that decisions about investments should be made based on a comprehensive cost-benefit analysis and on a cyber-risk assessment. However, many organizations do not undertake this sophisticated analyses due to the lack of available data about costs, benefits and the impact and likelihood of attacks...
master thesis 2017
document
Koeze, Ruben (author)
With the extensive use of the internet nowadays, companies are becoming more and more at risk from cyber-attacks. Especially SMEs are vulnerable, as they lack in cybersecurity. This is due to time, resource and knowledge constraints. In the literature no clear solutions can be found in order to help SMEs with their cybersecurity. To overcome...
master thesis 2017
document
Tajalizadehkhoob, S. (author)
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane, use online storage infrastructure maintained by hosting providers at the core of their criminal operations. <br/>However, in practice, we see large differences in the security measures...
doctoral thesis 2018
document
Samiotis, Ioannis Petros (author)
Side-Channel Attacks, are a prominent type of attacks, used to break cryptographic implementations on a computing system. They are based on information "leaked" by the hardware of a computing system, rather than the encryption algorithm itself. Recent studies showed that Side-Channel Attacks can be performed using Deep Learning models. In this...
master thesis 2018
document
Nandakumar, Lakshminarayanan (author)
With the emergence of many modern automated systems around us that rely heavily on the private data collected from individuals, the problem of privacy-preserving data analysis is now gaining a significant attention in the field of systems and control. In this thesis, we investigate the privacy concerns of these systems arising in the process of...
master thesis 2018
document
de Ronde, Xander (author)
The increased decentralisation and heterogeneity of critical infrastructure systems pose a threat to the safe and secure operation of critical infrastructures by complicating cybersecurity procedures. The increased frequency and impact of cyberthreats have led to the desire to develop coherent security policies. In order to explore the effects...
master thesis 2018
document
Arief, Raditya (author)
Cascading effects are high-impact, low-probability phenomena that have caused catastrophic impacts in various chemical and process plants around the world. With the increasing trend of cyberattacks targeting critical infrastructures, there is a concern that accidents caused by cyberattacks may trigger cascading effects in these facilities. In...
master thesis 2018
document
Çetin, F.O. (author), Hernandez Ganan, C. (author), Altena, E.M. (author), Kasama, Takahiro (author), Inoue, Daisuke (author), Tamiya, Kazuki (author), Tie, Ying (author), Yoshioka, Katsunari (author), van Eeten, M.J.G. (author)
With the rise of IoT botnets, the remediation of infected devices has become a critical task. As over 87% of these devices reside in broadband networks, this task will fall primarily to consumers and the Internet Service Providers. We present the first empirical study of IoT malware cleanup in the wild -- more specifically, of removing Mirai...
conference paper 2019
document
Rios Insua, David (author), Couce-Vieira, Aitor (author), Rubio, Jose A. (author), Pieters, W. (author), Labunets, K. (author), G. Rasines, Daniel (author)
Risk analysis is an essential methodology for cybersecurity as it allows organizations to deal with cyber threats potentially affecting them, prioritize the defense of their assets, and decide what security controls should be implemented. Many risk analysis methods are present in cybersecurity models, compliance frameworks, and international...
journal article 2019
document
Brands, Thijs (author)
The counterfeit market is rapidly expanding into the online realm. Large amounts of fraudulent webshops advertise luxury clothing and fashion accessories, but ship counterfeit products to their customers. Apart from customers, brand owners and domain registries experience a negative impact caused by these fake webshops. Current countermeasures...
master thesis 2019
document
Hildebrand, Esmee (author), Flinterman, Remi (author), Mulder, Joas (author), Smit, Albert (author)
This report documents the design and implementation of Clusus, a cyber range to provide students with a safe isolated environment to learn about cyber security and computer networks. This Bachelor project was proposed by the TU Delft cyber security group. During a two week research phase currently existing solutions were evaluated and...
bachelor thesis 2019
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
document
Booij, Tim (author)
The amount of people and devices connected through the Internet has been growing at a rapid pace; as of June 2019 58,8% of the world’s population and billions of devices are joined by this vast network of information resources and services. Not every Internet user however has benign intentions. Cybercriminals use this technology for their own...
master thesis 2019
document
Adjodha, Sharwan (author)
In the coming decades, more frequent and more extensive climate disasters such as coastal and river floods, droughts, extreme weather, and wildfires can be expected worldwide. Innovations will be required to face this grand challenge. The BRIGAID project developed a methodology consisting of a Test- and Implementation Framework and a set of...
master thesis 2019
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
van Baren, Rutger (author)
Cybersecurity is important to hospitals and patients alike and is becoming more important as healthcare is experiencing more cybercrime over time. It is the result of complex interactions between actors and their environment during procurement, but research has not yet studied the combination of cybersecurity, healthcare and procurement together...
master thesis 2021
Searched for: +
(1 - 20 of 33)

Pages