Searched for: mods_note_programme_s%3A%22Computer%255C+Science%255C+%257C%255C+Cyber%255C+Security%22
(1 - 20 of 79)

Pages

document
Pigmans, Max (author)
Most of the adversarial attacks suitable for attacking decision tree ensembles work by doing multiple local searches from randomly selected starting points, around the to be attacked victim. In this thesis we investigate the impact of these starting points on the performance of the attack, and find that the starting points significantly impact...
master thesis 2024
document
Simonov, Alex (author)
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influence on different aspects of our lives. It is, however, shown that...
master thesis 2024
document
Ho, Björn (author)
A searchable symmetric encryption (SSE) scheme allows a user to securely perform a keyword search on an encrypted database. This search capability is useful but comes with the price of unintentional information leakage. An attacker abuses leakage to steal confidential information by launching SSE attacks. In this work, our goal is to design a...
master thesis 2023
document
Băbălău, Ion (author)
In an era where cyber threats evolve with alarming speed and sophistication, the role of Security Operation Centers (SOCs) has become increasingly pivotal in safeguarding digital infrastructures. SOCs serve as the frontline defence against malicious entities, where they continuously monitor and analyze network traffic, as well as the activity of...
master thesis 2023
document
Angelova, Yana (author)
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday". <br/>Despite the increased importance, not all organisations have the same resources and knowledge when it comes to securing their networks against cyber adversaries. <br/><br...
master thesis 2023
document
Timmerman, Gerben (author)
This thesis offers a comprehensive exploration of log-based anomaly detection within the domain of cybersecurity incident response. The research describes a different approach and explores relevant log features for language model training, experimentation with different language models and training methodologies, and the investigation of the...
master thesis 2023
document
Zhang, Manning (author)
Searchable symmetric encryption (SSE) is an encryption scheme that allows a single user to perform searches over an encrypted dataset. The advent of dynamic SSE has further enhanced this scheme by enabling updates to the encrypted dataset, such as insertions and deletions. In dynamic SSE, attackers have employed file injection attacks, initially...
master thesis 2023
document
Chen, Congwen (author)
Current backdoor attacks against federated learning (FL) strongly rely on universal triggers or semantic patterns, which can be easily detected and filtered by certain defense mechanisms such as norm clipping, comparing parameter divergences among local updates. In this work, we propose a new stealthy and robust backdoor attack with flexible...
master thesis 2023
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Kazemi Koohbanani, Paolo Arash (author)
Distributed Denial of Service (DDoS) leverages the power of multiple servers to disrupt the operations of a victim service. Due to the financial risks posed by downtimes on critical online infrastructure, DDoS is among the top threats in the cybersecurity landscape.<br/><br/>In this paper, we analyze the characteristics of previously launched...
master thesis 2023
document
Thomas, Wessel (author)
Network Intrusion Detection Systems (NIDSs) defend our computer networks against malicious network attacks. Anomaly-based NIDSs use machine learning classifiers to categorise incoming traffic. Research has shown that classifiers are vulnerable to adversarial examples, perturbed inputs that lead the classifier into misclassifying the input....
master thesis 2023
document
Taneva, Aleksandra (author)
Nowadays, the online industry contributes to a multi-billion dollar business, facilitates most of the population's everyday activities, and processes vast amounts of data, including personal data. Current work aims to explore the inconsistency or consistency of the content obtained by the websites to generate cookies based on various data that...
master thesis 2023
document
van Schaick, Bart (author)
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...
master thesis 2023
document
Hristov, Tsvetomir (author)
Although digital watermarking has been a well-researched topic for the past decades and has seen numerous implementations for relational databases, it still lacks research for non-relational schema-less databases. In this paper, we explore proposed techniques for non-relational database watermarking and introduce an improved technique for NoSQL...
bachelor thesis 2023
document
Thomas, Jeroen (author)
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after which the server returns the documents that match the keyword (or...
master thesis 2022
document
Ilbaş, Hakan (author)
The amount of data individuals create keeps increasing every year to the point that the data cannot be stored on a single device anymore. Cloud storage provides a solution for this problem, but not everybody wants the cloud storage service providers to peek at their data and they thus encrypt their data before storing it on the service provider...
master thesis 2022
document
de With, Wim (author)
Recommender systems usually base their predictions on user-item interaction, a technique known as collaborative filtering. Vendors that utilize collaborative filtering generally exclusively use their own user-item interactions, but the accuracy of the recommendations may improve if several vendors share their data. Since user-item interaction...
master thesis 2022
document
Palazzo, Marco (author)
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These data can be aggregated to compute useful statistics from multiple sources using data aggregation protocols. However, oftentimes these data contain private information that must be protected from misuse. Privacy-preserving protocols can help to...
master thesis 2022
document
Nguyen, Charlie (author)
Over the past centuries, cybercrime has constantly grown. Among the most popular attacks against companies are phishing emails that especially gained popularity for threat actors to use as a tool during the COVID-19 pandemic. By changing the working environment, most communication channels between employees shifted from personal conversations...
master thesis 2022
document
Bezema, Menno (author)
Attacks using drones are increasing, war zones see more and more use of drones and civilian areas are threatened by cheap commercial drones. In order to prevent drone attacks, they have to be detected; identifiedand neutralized. Faster identification results in more time to respond, making identification vital. This thesisuses radar to identify...
master thesis 2022
Searched for: mods_note_programme_s%3A%22Computer%255C+Science%255C+%257C%255C+Cyber%255C+Security%22
(1 - 20 of 79)

Pages