Searched for: subject%3A%22Security%22
(1 - 9 of 9)
document
Kaur, M. (author)
Technological systems and infrastructures form the bedrock of modern society and it is system administrators (sysadmins) who configure, maintain and operate these infrastructures. More often than not, they do so behind the scenes. The work of system administration tends to be unseen and, consequently, not well known. After all, do you think of...
doctoral thesis 2023
document
Constantinescu, Vlad (author)
The interpretability of an attack graph is a key principle as it reflects the difficulty of a specialist to take insights into attacker strategies. However, the quantification of interpretability is considered to be a subjective manner and complex attack graphs can be challenging to read and interpret. In this research paper, we propose a new...
bachelor thesis 2023
document
Tomlinson, Andrew (author), Parkin, S.E. (author), Shaikh, Siraj Ahmed (author)
The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution...
journal article 2022
document
Bellizio, Federica (author), Xu, Wangkun (author), Qiu, Dawei (author), Ye, Yujian (author), Papadaskalopoulos, Dimitrios (author), Cremer, Jochen (author), Teng, Fei (author), Strbac, Goran (author)
Digitalization is one of the key drivers for energy system transformation. The advances in communication technologies and measurement devices render available a large amount of operational data and enable the centralization of such data storage and processing. The greater access to data opens up new opportunities for a more efficient and...
journal article 2022
document
Förstel, Irène (author)
Nowadays does the internet presence of companies increase, and with it, their attack surface and the probability of breaches: every information system in the company's network may be an entry point for an outsider. Therefore, companies need to secure their information systems. However, current risk assessment frameworks fail to connect the...
master thesis 2021
document
d' Estalenx, Antoine (author)
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these devices are completely unaware of the security risks that connecting these devices entail. Current...
master thesis 2021
document
de Bruijn, J.A. (author), Janssen, M.F.W.H.A. (author)
Cybersecurity is a global phenomenon representing a complex socio-technical challenge for governments, but requiring the involvement of individuals. Although cybersecurity is one of the most important challenges faced by governments today, the visibility and public awareness remains limited. Almost everybody has heard of cybersecurity,...
journal article 2017
document
Schmidt, A. (author)
Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful...
doctoral thesis 2014
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Arnbak, A.M. (author), Van Eijk, N.A.N.M. (author)
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the...
report 2013
Searched for: subject%3A%22Security%22
(1 - 9 of 9)