Searched for: subject%3A%22Cyber%255C-attacks%22
(1 - 9 of 9)
document
Vian, Giacomo (author)
The proliferation of Distributed Energy Resources (DERs) is decentralizing the power system, with more and more capacity installed in the distribution grids. Concurrently, the energy sector is embracing the Internet of Things (IoT) paradigm, resulting in the emergence of the Internet of Energy. However, this transformation introduces new...
master thesis 2023
document
Hofman, Daan (author)
With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs has become increasingly difficult, accelerating the development of...
master thesis 2023
document
ZHANG, JIAXUAN (author)
Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...
master thesis 2023
document
Semertzis, Ioannis (author)
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. These traditionally segregated systems are now being integrated with general-purpose Information and Communication Technologies (ICTs). The coupling of the physical power system and its communications infrastructure forms a complex, interdependent...
master thesis 2021
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Tzanakou, Eleni (author)
Nowadays, by using the new ICT technologies the functional efficiency of the Smart Grid is increased but at the same time leads to a more vulnerable system and makes the Smart Grid a potential target for cyber-attacks. In fact, cyber-attacks are becoming one of the most serious threats in critical infrastructures. More than 80% of energy...
master thesis 2017
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
Searched for: subject%3A%22Cyber%255C-attacks%22
(1 - 9 of 9)