Searched for: subject%3A%22cybersecurity%22
(1 - 20 of 66)

Pages

document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Simonov, Alex (author)
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influence on different aspects of our lives. It is, however, shown that...
master thesis 2024
document
Spanninga, Paulien (author)
In recent years, the medical world has seen rapid digitalisation. Digitalisation of healthcare and the opportunities of remote monitoring can help to keep the healthcare system affordable and accessible. A promising application of remote monitoring is the use of consumer-grade wearables for clinical care. However, vulnerabilities leave consumer...
master thesis 2023
document
Kaur, M. (author)
Technological systems and infrastructures form the bedrock of modern society and it is system administrators (sysadmins) who configure, maintain and operate these infrastructures. More often than not, they do so behind the scenes. The work of system administration tends to be unseen and, consequently, not well known. After all, do you think of...
doctoral thesis 2023
document
Bissumbhar, Josephine (author)
In a rapidly evolving digital landscape, where information is the currency of progress, universities play a vital role in fostering innovation, research, and knowledge dissemination. However, this invaluable role also exposes universities to significant cybersecurity challenges. Cybersecurity is an increasingly important topic for organisations...
master thesis 2023
document
Angelova, Yana (author)
In recent years, more and more emphasis has been put on the importance of good preventative cyber security and vulnerability management techniques such as "Patch Tuesday". <br/>Despite the increased importance, not all organisations have the same resources and knowledge when it comes to securing their networks against cyber adversaries. <br/><br...
master thesis 2023
document
Timmerman, Gerben (author)
This thesis offers a comprehensive exploration of log-based anomaly detection within the domain of cybersecurity incident response. The research describes a different approach and explores relevant log features for language model training, experimentation with different language models and training methodologies, and the investigation of the...
master thesis 2023
document
Gaalswijk, Jonathan (author)
Critical infrastructures, such as the energy sector, are vital for the proper functioning of society. It is crucial to protect these infrastructures against cyberattacks on their operational technology, ensuring their operational performance, and safeguarding energy safety. There is a lack of existing research on improving cybersecurity in...
master thesis 2023
document
Bahl, Robin (author)
Addressing the growing problem of phishing attacks requires nurturing a reporting culture within organizations. This research examines the factors influencing reporting behavior and the role of infrastructure &amp; support in enhancing reporting rates. By adopting a mixed methods approach and analyzing phishing simulation logs and user...
master thesis 2023
document
Constantinescu, Vlad (author)
The interpretability of an attack graph is a key principle as it reflects the difficulty of a specialist to take insights into attacker strategies. However, the quantification of interpretability is considered to be a subjective manner and complex attack graphs can be challenging to read and interpret. In this research paper, we propose a new...
bachelor thesis 2023
document
Oprea, Ioan (author)
SAGE is a deterministic and unsupervised learning pipeline that can generate attack graphs from intrusion alerts without input knowledge from a security analyst. Using a suffix-based probabilistic deterministic finite automaton (S-PDFA), the system compresses over 1 million alerts into less than 500 attack graphs (AGs), which are concise and...
bachelor thesis 2023
document
Onkenhout, Job (author)
In 2019 a quantum computer performed a highly complex operation in 4 minutes, which would have taken the most powerful supercomputers of today around 10,000 years. Performing calculations unimaginably faster than is currently possible may bring great opportunities, but may implicate a threat to digital communications. Digital communication is...
master thesis 2023
document
Oosthoek, K. (author)
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly affected individuals, companies, governments and critical infrastructure. It has led to significant financial damage, impeded critical infrastructure and harmed human lives. Defending against cybercrime is difficult, as persistent actors perpetually...
doctoral thesis 2023
document
van der Boon, Mike (author)
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation responsibilities. This will happen during the transition of the current power grid to the Smart Grid. Due to the importance of this power to society, it is crucial that the grid stays stable.<br/><br/>DER devices are similar to IoT devices in scale...
master thesis 2023
document
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...
journal article 2023
document
Christiansen, L.V.C. (author), Bharosa, Nitesh (author), Janssen, M.F.W.H.A. (author)
As the development of quantum computers advances, actors relying on public key infrastructures (PKI) for secure information exchange are becoming aware of the disruptive implications. Currently, governments and businesses employ PKI for many core processes that may become insecure or unavailable when quantum computers break the cryptographic...
conference paper 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Shoker, Ali (author), Rahli, Vincent (author), Decouchant, Jérémie (author), Esteves-Veríssimo, Paulo (author)
Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition, prevention is limited to few primitive options like dropping network packets or extreme options, e.g., ECU Bus-off state. To fill this gap, we introduce the...
conference paper 2023
document
Nadeem, A. (author), Vos, D.A. (author), Cao, C.S. (author), Pajola, Luca (author), Dieck, S. (author), Baumgartner, R. (author), Verwer, S.E. (author)
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We identify 3 cybersecurity stakeholders, i.e., model users, designers,...
conference paper 2023
Searched for: subject%3A%22cybersecurity%22
(1 - 20 of 66)

Pages