Searched for: subject%3A%22Cyber%255C+Security%22
(1 - 20 of 70)

Pages

document
Jeong, Yoon Hwan (author)
In order to combat increasing spam calls, many applications are developed and downloaded to block those calls. Some studies about performance of the applications were previously conducted, however, the actual processes the applications go through to intercept and block the spam calls are not well studied. This research presents a method to...
bachelor thesis 2022
document
Yüksel, Akif (author)
Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...
bachelor thesis 2021
document
de Los Santos Subirats, Alex (author)
Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...
bachelor thesis 2022
document
Bubberman, Wolf (author)
The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify...
bachelor thesis 2020
document
Stefanov, Radoslav (author)
Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...
bachelor thesis 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and...
book 2021
document
Parkin, S.E. (author), Arnell, Simon (author), Ward, Jeremy (author)
Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We propose that supporting the trading zone is a route to sustainable,...
conference paper 2021
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Lin, Q. (author), Verwer, S.E. (author), Kooij, Robert (author), Mathur, Aditya (author)
The availability of high-quality benchmark datasets is an important prerequisite for research and education in the cyber security domain. Datasets from realistic systems offer a platform for researchers to develop and test novel models and algorithms. Such datasets also offer students opportunities for active and project-centric learning. In...
conference paper 2020
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical power grids to cyber threats. They highlighted the significance of Operational Technology (OT) communication-based anomaly detection. Many anomaly detection methods are based on real-time traffic monitoring, i.e., Intrusion Detection Systems (IDS) that may...
conference paper 2023
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Musunuri, Shyam (author), de Wit, Johan (author)
Driven by power grid digitalisation, tighter coupling between the cyber and physical layers has introduced cyber security threats. This paper elucidates the emergence and possible consequences of recently identified Information Technology (IT) / Industrial Internet of Things (IIoT) vulnerabilities, i.e., Ripple20, and the threats it poses to...
conference paper 2021
document
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...
conference paper 2017
document
Bierens, R.H. (author), Klievink, A.J. (author), van den Berg, Jan (author)
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the...
conference paper 2017
document
Najm, Z. (author)
doctoral thesis 2023
document
Chockalingam, S. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
doctoral thesis 2020
document
Maathuis, E.C. (author)
Cyber Warfare is perceived as a radical shift in the nature of warfare. It can represent a real alternative next to other types of Military Operations to achieve military and/or political goals in front of adversaries. To this end, Cyber Operations use specific technologies i.e. cyber weapons/capabilities/means. With a short but intense history...
doctoral thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Pieters, W. (author), Hadžiosmanovi?, D. (author), Dechesne, F. (author)
onceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by...
journal article 2015
Searched for: subject%3A%22Cyber%255C+Security%22
(1 - 20 of 70)

Pages