- document
-
Gnanavarothayan, Kabilan (author)The use of Internet of Things (IoT) devices has experienced an increase since its inception and is expected to continue to do so. However, this growth has also attracted individuals with malicious intentions. Botnet attacks on IoT devices have become more potent each year, exploiting new vulnerabilities and attacking more devices. Therefore, it...master thesis 2023
- document
- Najm, Z. (author) doctoral thesis 2023
- document
-
ZHANG, JIAXUAN (author)Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...master thesis 2023
- document
-
Kruijsse, Hendrik Jan (author)Nowadays, the society strongly depends on computer networks and systems as a means of reliable communication and data storage. In order to maintain absolute security of the networks and thus the society, one would need to separate everything, but this is not feasible. Consequently, sharing of resources is inevitable. There are security products...master thesis 2023
- document
-
Chaal, M. (author), Ren, X. (author), Bahootoroody, A. (author), Basnet, Sunil (author), Bolbot, Victor (author), Banda, Osiris A.Valdez (author), van Gelder, P.H.A.J.M. (author)The safety and reliability of autonomous ships are critical for the successful realization of an autonomous maritime ecosystem. Research and collaboration between governments, industry, and academia are vital in achieving this goal. This paper conducts a bibliometric review of the research on the risk, safety, and reliability of autonomous ships...review 2023
- document
-
Murillo, Andrés (author), Taormina, R. (author), Tippenhauer, Nils Ole (author), Galelli, Stefano (author)A fundamental problem in the realm of cyber-physical security of smart water networks is attack detection, a key step towards designing adequate countermeasures. This task is typically carried out by algorithms that analyze time series of process data. However, the nature of the data available to develop these algorithms limits their...journal article 2023
- document
-
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...journal article 2023
- document
-
Al-Kaswan, Ali (author)Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...master thesis 2022
- document
-
Thiessen, Sven (author)The uprise of the Internet of Things (IoT) has been a hot topic for several years. While many see these devices and think they bring ease to their lives, it is far from reality. Researchers found many privacy and security problems within these devices in the last years. The popularity of these devices causes many users to bring a device into...master thesis 2022
- document
-
Steenbrink, Tim (author)Recent advances in the field of ‘Zero Trust’ security strategies have revealed that there is still much novelty regarding the concept of Zero Trust architecture (ZTA). Zero Trust has recently gained attention as the traditional approach, based on network perimeter security, is being outplayed by sophisticated cyber attacks. This research...master thesis 2022
- document
-
Maquelin, Suzanne (author)Interpreted applications are often vulnerable to remote code execution attacks. To protect interpreted applications, we should reduce the tools available to the attackers. In this thesis, we investigate the possibilities for the automation of policy generation for interpreted applications in terms of system call arguments. These policies are...master thesis 2022
- document
-
de Los Santos Subirats, Alex (author)Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...bachelor thesis 2022
- document
-
Jeong, Yoon Hwan (author)In order to combat increasing spam calls, many applications are developed and downloaded to block those calls. Some studies about performance of the applications were previously conducted, however, the actual processes the applications go through to intercept and block the spam calls are not well studied. This research presents a method to...bachelor thesis 2022
- document
- van de Weijer, Teun (author) master thesis 2022
- document
-
Mulder, Tijmen (author)From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...master thesis 2022
- document
-
Kumaresan, Anusha (author), Kandasamy, Nandha Kumar (author), Kooij, Robert (author)The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs....journal article 2022
- document
-
Flor, Vinicius B.Braga (author), Filho, Milton B.Do Coutto (author), de Souza, Julio C.Stacchini (author), Vergara Barrios, P.P. (author)Intelligent electrical power grids, widely referred to as smart grids (SGs), rely on digital technology resources, especially communication and measurement devices, becoming a cyber-physical energy system. Massive data flow between grid elements makes smart grids more vulnerable to cyber-attacks. Power system state estimation (SE) - an...journal article 2022
- document
-
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)The concept of the internet of energy (IoE) emerged as an innovative paradigm to encompass all the complex and intertwined notions relevant to the transition of current smart grids towards more decarbonization, digitalization and decentralization. With a focus on the two last aspects, the amount of intelligent devices being connected in a...journal article 2022
- document
-
Marot, Antoine (author), Kelly, Adrian (author), Naglic, M. (author), Barbesant, Vincent (author), Cremer, Jochen (author), Stefanov, Alexandru (author), Viebahn, Jan (author)Today's power systems are seeing a paradigm shift under the energy transition, sparkled by the electrification of demand, digitalisation of systems, and an increasing share of decarbonated power generation. Most of these changes have a direct impact on their control centers, forcing them to handle weather-based energy resources, new...journal article 2022
- document
-
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)Paper ID – 0348conference paper 2022