Searched for: subject:"Cyber%5C+Security"
(1 - 20 of 34)

Pages

document
van Rijn, Vincent (author)
Virtualization is the fundamental technology that enabled the widespread adoption of cloud computing. With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees and low performance overhead from isolation platforms are paramount. An ideal isolation platform offers both: an infallible isolation boundary...
master thesis 2021
document
Chockalingam, S. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
doctoral thesis 2020
document
Cao, Clinton (author)
The Internet is a technology that was invented in the 1960s and was used only by a few users to do simple communications between computers. Fast forward to 2020, the Internet has become a technology that is being used by billions of users. It allows users to communicate with each other across the world and even allows users to access data...
master thesis 2020
document
Gramatikov, S.T. (author)
Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of internet and the globalisation of technology supply chains, as well as the growing political and economic pressure around the world, cyber warfare has become the new weapon of choice for covert state operations, but also rogue organizations. In the...
master thesis 2020
document
Maathuis, E.C. (author)
Cyber Warfare is perceived as a radical shift in the nature of warfare. It can represent a real alternative next to other types of Military Operations to achieve military and/or political goals in front of adversaries. To this end, Cyber Operations use specific technologies i.e. cyber weapons/capabilities/means. With a short but intense history...
doctoral thesis 2020
document
Serentellos, V. (author)
Computer networks have nowadays assumed an increasingly important role in the expression of modern human activity through the ongoing rapid development in the field of Information and Communication Technologies (ICT). More and more individual users and businesses around the world are gaining access to networks online, while the range of services...
master thesis 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Vos, Daniël (author)
In the present day we use machine learning for sensitive tasks that require models to be both understandable and robust. Although traditional models such as decision trees are understandable, they suffer from adversarial attacks. When a decision tree is used to differentiate between a user's benign and malicious behavior, an adversarial attack...
master thesis 2020
document
Bubberman, Wolfgang (author)
The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify...
bachelor thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Peyghami, S. (author), Palensky, P. (author), Blaabjerg, Frede (author)
Renewable energy resources are becoming the dominating element in power systems. Along with de-carbonization, they transform power systems into a more distributed, autonomous, bottom-up style one. We speak of Smart Grid and Microgrid when distributed energy resources take over. While being a means to improve technical and financial efficiency,...
journal article 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Verstegen, Susanne (author)
Malicious software such as botnets are a threat to society and increasingly so through Internet of Things (IoT) devices. The large volume, pervasiveness and high vulnerability of IoT devices make them low hanging fruit for malicious actors. Currently, the biggest threat for insecure IoT devices is Mirai, a botnet which is deployed for DDoS...
master thesis 2019
document
van Ardenne, Maurits (author)
We have entered a new époque, transforming our societies from the mechanical to the digital. This unlocks a lot of new opportunities and abilities, but also results into big societal and behavioural changes, which need to be addressed in our built environment. Architecture seems to have disappeared on the background, while technological...
master thesis 2019
document
Sewnandan, Jhoties (author)
Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of properly conducting cyber risk management processes do not make it easier for organisations to cope with cyberattacks. Cyber insurance can be a partial solution to the dilemma that organisations face. However, it has not seen the expected growth...
master thesis 2018
document
Carranza Pasten, Monica (author)
With the inclusion of Electric Vehicles Charging Stations in the city of Amsterdam, there is not enough knowledge to understand if the electrical grid infrastructure can withstand this increase in the load. In this thesis work the distribution grid of Amsterdam has been replicated and a cyber attack against the EV Charging Stations has been...
master thesis 2018
document
Manikandan, Hari (author)
In less than a century, the Internet has morphed from being a communication channel to a medium of existence for people. Meanwhile, attacks over the Internet have been growing both qualitatively and quantitatively, with losses transcending the financial kind and threatening the well-being of human lives. This trend fuels the need for Cyber...
master thesis 2018
document
Natalius, Samuel (author)
Understanding target selection is a step before making a suitable proactive measure to address the complex issue of banking malware in online banking landscape. Despite several previous studies, gaps in the research of target selection are still present like the lack of attention to the non-targeted entities, the presence of other potential...
master thesis 2018
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Martinez Bustamante, Inés (author)
Cyber security is getting more attention in the last decades. Unfortunately, the 100% cyber security protection is impractical and impossible, and therefore, we need to consider other cyber risk management strategies. One of them is cyber insurance, but its adoption has been slow in Europe and even more among SMEs. This thesis presents a...
master thesis 2018
Searched for: subject:"Cyber%5C+Security"
(1 - 20 of 34)

Pages