Searched for: subject%3A%22Security%22
(1 - 20 of 31)

Pages

document
Najm, Z. (author)
doctoral thesis 2023
document
Chaal, M. (author), Ren, X. (author), Bahootoroody, A. (author), Basnet, Sunil (author), Bolbot, Victor (author), Banda, Osiris A.Valdez (author), van Gelder, P.H.A.J.M. (author)
The safety and reliability of autonomous ships are critical for the successful realization of an autonomous maritime ecosystem. Research and collaboration between governments, industry, and academia are vital in achieving this goal. This paper conducts a bibliometric review of the research on the risk, safety, and reliability of autonomous ships...
review 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical power grids to cyber threats. They highlighted the significance of Operational Technology (OT) communication-based anomaly detection. Many anomaly detection methods are based on real-time traffic monitoring, i.e., Intrusion Detection Systems (IDS) that may...
conference paper 2023
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The solar industry in residential areas has been witnessing an astonishing growth worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside smart inverters (SIs). These IoT-enabled devices aim to introduce a certain degree of intelligence to conventional inverters by integrating various grid support...
journal article 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Al-Kaswan, Ali (author)
Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...
master thesis 2022
document
Mulder, Tijmen (author)
From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...
master thesis 2022
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The concept of the internet of energy (IoE) emerged as an innovative paradigm to encompass all the complex and intertwined notions relevant to the transition of current smart grids towards more decarbonization, digitalization and decentralization. With a focus on the two last aspects, the amount of intelligent devices being connected in a...
journal article 2022
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Marot, Antoine (author), Kelly, Adrian (author), Naglic, M. (author), Barbesant, Vincent (author), Cremer, Jochen (author), Stefanov, Alexandru (author), Viebahn, Jan (author)
Today's power systems are seeing a paradigm shift under the energy transition, sparkled by the electrification of demand, digitalisation of systems, and an increasing share of decarbonated power generation. Most of these changes have a direct impact on their control centers, forcing them to handle weather-based energy resources, new...
journal article 2022
document
Ranade, Vedang Suhas (author)
Industrial control systems (ICSs) are used widely throughout the world for the control of large, complex industrial plants and consist of the entire setups of control system including sensors, PLCs (Programmable Logic Controllers), actuators and communication devices. The communication between these ICS devices is performed using industrial...
master thesis 2021
document
Kerkhof, Maikel (author)
Deep learning techniques have become the tool of choice for side-channel analysis. In recent years, neural networks like multi-layer perceptrons and convolutional neural networks have proven to be the most powerful instruments for performing side-channel analysis. Recent work on this topic has focused on different aspects of these techniques,...
master thesis 2021
document
Stefanov, Radoslav (author)
Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...
bachelor thesis 2021
document
Yüksel, Akif (author)
Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...
bachelor thesis 2021
document
de Bruijn, Vasco (author)
In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...
master thesis 2021
document
Liu, Chen-Ching (author), Bedoya, Juan C. (author), Sahani, Nitasha (author), Stefanov, Alexandru (author), Appiah-Kubi, Jennifer (author), Sun, Chih Che (author), Lee, Jin Young (author), Zhu, Ruoxi (author)
The Information and Communications Technology (ICT) for control and monitoring of power systems is a layer on top of the physical power system infrastructure. The cyber system and physical power system components form a tightly coupled Cyber-Physical System (CPS). Sources of vulnerabilities arise from the computing and communication systems...
journal article 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and...
book 2021
document
Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Musunuri, Shyam (author), de Wit, Johan (author)
Driven by power grid digitalisation, tighter coupling between the cyber and physical layers has introduced cyber security threats. This paper elucidates the emergence and possible consequences of recently identified Information Technology (IT) / Industrial Internet of Things (IIoT) vulnerabilities, i.e., Ripple20, and the threats it poses to...
conference paper 2021
document
Cao, Clinton (author)
The Internet is a technology that was invented in the 1960s and was used only by a few users to do simple communications between computers. Fast forward to 2020, the Internet has become a technology that is being used by billions of users. It allows users to communicate with each other across the world and even allows users to access data...
master thesis 2020
document
Serentellos, V. (author)
Computer networks have nowadays assumed an increasingly important role in the expression of modern human activity through the ongoing rapid development in the field of Information and Communication Technologies (ICT). More and more individual users and businesses around the world are gaining access to networks online, while the range of services...
master thesis 2020
Searched for: subject%3A%22Security%22
(1 - 20 of 31)

Pages