Searched for: subject%3A%22Cyber%255C%2BSecurity%22
(1 - 20 of 47)

Pages

document
van de Weijer, Teun (author)
master thesis 2022
document
Mulder, Tijmen (author)
From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...
master thesis 2022
document
Kumaresan, Anusha (author), Kandasamy, Nandha Kumar (author), Kooij, Robert (author)
The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs....
journal article 2022
document
Ranade, Vedang Suhas (author)
Industrial control systems (ICSs) are used widely throughout the world for the control of large, complex industrial plants and consist of the entire setups of control system including sensors, PLCs (Programmable Logic Controllers), actuators and communication devices. The communication between these ICS devices is performed using industrial...
master thesis 2021
document
Kerkhof, Maikel (author)
Deep learning techniques have become the tool of choice for side-channel analysis. In recent years, neural networks like multi-layer perceptrons and convolutional neural networks have proven to be the most powerful instruments for performing side-channel analysis. Recent work on this topic has focused on different aspects of these techniques,...
master thesis 2021
document
van Gurp, Ralph (author)
Malware presents a growing problem in a world that is increasingly connected to, and reliant on, the internet. The growing, devastating potential of cyber attacks such as DDoS attacks on society and economy is largely the result of a new class of devices, the Internet of Things (IoT), whose characteristic vulnerabilities make them easy targets...
master thesis 2021
document
Stefanov, Radoslav (author)
Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...
bachelor thesis 2021
document
Yüksel, Akif (author)
Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...
bachelor thesis 2021
document
de Bruijn, Vasco (author)
In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...
master thesis 2021
document
van Rijn, Vincent (author)
Virtualization is the fundamental technology that enabled the widespread adoption of cloud computing. With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees and low performance overhead from isolation platforms are paramount. An ideal isolation platform offers both: an infallible isolation boundary...
master thesis 2021
document
Maestre, José M. (author), Velarde, Pablo (author), Ishii, Hideaki (author), Negenborn, R.R. (author)
In this paper, we present an analysis of the vulnerability of a distributed model predictive control (DMPC) scheme in the context of cyber-security. We consider different types of the so-called insider attacks. In particular, we consider the situation where one of the local controllers sends false information to others to manipulate costs for...
journal article 2021
document
Parkin, S.E. (author), Arnell, Simon (author), Ward, Jeremy (author)
Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We propose that supporting the trading zone is a route to sustainable,...
conference paper 2021
document
Chockalingam, S. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
doctoral thesis 2020
document
Cao, Clinton (author)
The Internet is a technology that was invented in the 1960s and was used only by a few users to do simple communications between computers. Fast forward to 2020, the Internet has become a technology that is being used by billions of users. It allows users to communicate with each other across the world and even allows users to access data...
master thesis 2020
document
Gramatikov, S.T. (author)
Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of internet and the globalisation of technology supply chains, as well as the growing political and economic pressure around the world, cyber warfare has become the new weapon of choice for covert state operations, but also rogue organizations. In the...
master thesis 2020
document
Maathuis, E.C. (author)
Cyber Warfare is perceived as a radical shift in the nature of warfare. It can represent a real alternative next to other types of Military Operations to achieve military and/or political goals in front of adversaries. To this end, Cyber Operations use specific technologies i.e. cyber weapons/capabilities/means. With a short but intense history...
doctoral thesis 2020
document
Serentellos, V. (author)
Computer networks have nowadays assumed an increasingly important role in the expression of modern human activity through the ongoing rapid development in the field of Information and Communication Technologies (ICT). More and more individual users and businesses around the world are gaining access to networks online, while the range of services...
master thesis 2020
document
Vos, Daniël (author)
In the present day we use machine learning for sensitive tasks that require models to be both understandable and robust. Although traditional models such as decision trees are understandable, they suffer from adversarial attacks. When a decision tree is used to differentiate between a user's benign and malicious behavior, an adversarial attack...
master thesis 2020
document
Bubberman, Wolf (author)
The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify...
bachelor thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
Searched for: subject%3A%22Cyber%255C%2BSecurity%22
(1 - 20 of 47)

Pages