Searched for: subject:"Security"
(1 - 20 of 317)

Pages

document
van der Ende, Dieuwke (author)
Decision-tree evaluation is a widely-used classification approach known for its simplicity and effectiveness. Decision-tree models are shown to be helpful in classifying instances of fraud, malware, or diseases and can be used to make dynamic, flexible access decisions within an access-control system. These applications often require sensitive...
master thesis 2021
document
van Rijn, Vincent (author)
Virtualization is the fundamental technology that enabled the widespread adoption of cloud computing. With the ever-increasing pervasiveness of the cloud computing paradigm, strong isolation guarantees and low performance overhead from isolation platforms are paramount. An ideal isolation platform offers both: an infallible isolation boundary...
master thesis 2021
document
Kerkhof, Jorden (author)
The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with distinctive security levels. The sensitive data is stored and managed...
master thesis 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Chen, C. (author), Li, Changjun (author), Reniers, G.L.L.M.E. (author), Yang, F. (author)
The terrorist attack on the Abqaiq oil plant in Saudi Arabia on September 14, 2019 attracted global attention to the significant role of safety and security in the sustainable oil and gas supply chain and the vulnerability of supply infrastructures subject to intentional and unintentional damages. Different from other oil and gas supply...
journal article 2021
document
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal processing tasks over networks in a decentralized fashion without violating privacy. Many existing algorithms can be adopted to solve this problem such as differential privacy, secure multiparty...
journal article 2021
document
Sas, Marlies (author), Ponnet, Koen (author), Reniers, G.L.L.M.E. (author), Hardyns, Wim (author)
As policy makers are developing new alternative strategies to prevent bicycle theft, a nudging approach could provide useful insights in this field. In the current study, two different nudges were implemented at a selection of bicycle parking facilities in the neighborhood of a Belgian university campus. To measure the effectiveness of the...
journal article 2021
document
Kumar, Gulshan (author), Saha, Rahul (author), Lal, C. (author), Conti, Mauro (author)
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization...
journal article 2021
document
Li, Jie (author), Goerlandt, Floris (author), van Nunen, K.L.L. (author), Reniers, G.L.L.M.E. (author)
Safety and security are often considered in complimentary or opposing terms. Discussions on their conceptual meaning have been put forward, and calls for an increased integration of these domains have been made. Nevertheless, there is currently no high-level empirical comparison of the development and contents of these research domains. In this...
journal article 2021
document
Chockalingam, S. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
doctoral thesis 2020
document
Okkerman, Hans (author)
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightweight devices with an internet connection have been integrated into many aspects of daily life; from consumer products to industrial processes and from medical applications to critical infrastructures. Cisco predicts that by 2023, more than half of...
master thesis 2020
document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
Cao, Clinton (author)
The Internet is a technology that was invented in the 1960s and was used only by a few users to do simple communications between computers. Fast forward to 2020, the Internet has become a technology that is being used by billions of users. It allows users to communicate with each other across the world and even allows users to access data...
master thesis 2020
document
Goessens, Max (author)
The field of energy security is dominantly filled with concepts and frameworks built on the characteristics of traditional fossil fuel energy systems. Increasing penetration of renewable energy sources in the energy system brings about novel implications and challenges in the field of energy security. Hydrogen is an increasingly popular option...
master thesis 2020
document
van Rossum, Tim (author)
The Internet consists of many subnetworks, which are connected to each other. These subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a part of it. In order to successfully determine routes from one of these ASes to the other, the Border Gateway Protocol (BGP) is used. This protocol has several security flaws...
master thesis 2020
document
Dhoore, Karel (author)
Wildlife conservation efforts are constrained by a limited amount of resources available for surveillance activities. UAVs are used increasingly to assist rangers in patrol tasks. Effectively patrolling wildlife parks requires detailed knowledge of the environment and its threats, which is not always available. Previous work in Green Security...
master thesis 2020
document
Lam, Julia (author)
EU banks have a dual obligation to generate and protect assets as a due diligence for their customers, their business longevity, and in accordance with regulatory bodies. The effective use of data presents opportunities for banks to meet their obligations in improving financial risk and also ensuring business growth and continuity in their...
master thesis 2020
document
Gramatikov, S.T. (author)
Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of internet and the globalisation of technology supply chains, as well as the growing political and economic pressure around the world, cyber warfare has become the new weapon of choice for covert state operations, but also rogue organizations. In the...
master thesis 2020
document
van Rijnsoever, X. (author)
Software bugs in many different variants can potentially leak sensitive data to an attacker. Implementing a separation mechanism for security domains can prevent incorrect or malicious code to leak sensitive data from one security domain to another. This work presents a separation mechanism based on labeling security domains with a label in...
master thesis 2020
document
Maathuis, E.C. (author)
Cyber Warfare is perceived as a radical shift in the nature of warfare. It can represent a real alternative next to other types of Military Operations to achieve military and/or political goals in front of adversaries. To this end, Cyber Operations use specific technologies i.e. cyber weapons/capabilities/means. With a short but intense history...
doctoral thesis 2020
Searched for: subject:"Security"
(1 - 20 of 317)

Pages