Searched for: subject%3A%22cybersecurity%22
(1 - 20 of 41)

Pages

document
Joseph, Reshma (author)
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have commonly used phishing as a social engineering technique to deploy a ransomware attack. Critical infrastructures such as hospitals have been the common target of these attacks due to hospitals’ sudden increase in digitization and interconnectivity,...
master thesis 2022
document
Plas, Nicolas (author)
Software-Defined Networking (SDN) is a relatively new networking paradigm that proposes to separate the control and the data logic in networks. The control logic is centralized in a controller, which allows for a programmable network. SDN is promising but also intro- duces some critical security vulnerabilities to networks. This work proposes a...
bachelor thesis 2022
document
Florea, Vlad (author)
Software Defined Networking (SDN) is a new paradigm that allows for greater reliability and more efficient management compared to traditional networks. However, SDN security is a developing field, and research towards fixing significant security vulnerabilities is still ongoing. One major threat to SDN security are attacks that seek to exploit...
bachelor thesis 2022
document
Lone, Q.B. (author)
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Distributed Denial of Service (DDoS) attacks, policy evasion and a range of application-level...
doctoral thesis 2022
document
Casino, Fran (author), Dasaklis, Thomas K. (author), Spathoulas, George (author), Anagnostopoulos, Marios (author), Ghosal, Amrita (author), Borocz, Istvan (author), Solanas, Agusti (author), Conti, M. (author), Patsakis, Constantinos (author)
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have...
journal article 2022
document
Janssen, M.F.W.H.A. (author)
Governments are confronted with all kinds of changes in their digital environment, such as pandemics, fake news, and security breaches. These changes come with many uncertainties and are hard to predict, whereas decisions need to be made quickly to avoid a negative impact. Adaptive governance embraces uncertainty and complexity by enabling...
conference paper 2022
document
Förstel, Irène (author)
Nowadays does the internet presence of companies increase, and with it, their attack surface and the probability of breaches: every information system in the company's network may be an entry point for an outsider. Therefore, companies need to secure their information systems. However, current risk assessment frameworks fail to connect the...
master thesis 2021
document
d' Estalenx, Antoine (author)
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these devices are completely unaware of the security risks that connecting these devices entail. Current...
master thesis 2021
document
de Roon, Tom (author)
Connecting ‘things’ like a doorbell, webcam, lamp, or other objects to the web to provide a service or control is called the Internet of Things (IoT). These devices contain vulnerabilities that form risks for the device user and possibly the network owner through their heterogeneity. The identified knowledge gap is the need for more IoT...
master thesis 2021
document
Duroyon, Marin (author)
Routing Protocol for Low Power and Lossy Networks (RPL) is a routing protocol for Internet of Things (IoT) devices with limited resources. As IoT is becoming prevalent, it is important to secure the underlying protocols that compose it such as RPL. This paper sought to avoid an RPL-specific routing attack by modifying the protocol's...
bachelor thesis 2021
document
Roeling, M.P. (author)
This thesis presents several methodological and statistical solutions to problems encountered in cyber security. We investigated the effects of compromised data veracity in state estimators and fraud detection systems, a model to impute missing data in attributes of linked observations, and an unsupervised approach to detect infected machines in...
doctoral thesis 2021
document
Su, Kevin (author)
To protect critical services in today's society it is necessary to mitigate and prevent risks threatening the reliability of the internet. Internet-of-Things (IoT) devices are the number one attack target on the internet. The situation will become worse as there will be an expected 40 billion IoT devices in 2025. IoT bot activity represented 78%...
master thesis 2021
document
van Baren, Rutger (author)
Cybersecurity is important to hospitals and patients alike and is becoming more important as healthcare is experiencing more cybercrime over time. It is the result of complex interactions between actors and their environment during procurement, but research has not yet studied the combination of cybersecurity, healthcare and procurement together...
master thesis 2021
document
Rao, Vivek (author), Moore, George (author), Jung, Hyun Jie (author), Kim, E.Y. (author), Agogino, Alice (author), Goucher-Lambert, Kosa (author)
Increasingly digital products and services make cybersecurity a crucial issue for designers. However, human-centered designers struggle to consider it in their work, partially a consequence of the high psychological distance between designers and cybersecurity. In this work, we build on the Design for Cybersecurity (DfC) Cards, an...
journal article 2021
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Viganò, Eleonora (author), Loi, Michele (author), Yaghmaei, E. (author)
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity in national security, with a focus on the ethics of surveillance for protecting critical infrastructures and the use of AI. A bibliographic analysis...
book chapter 2020
document
van den Berg, J. (author)
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been considered a technical challenge, and still many specialists understand it as information security, with the notions of confidentiality, integrity, and availability as its foundation. Although many have searched for different and broader...
journal article 2020
document
Hesselman, Cristian (author), Grosso, Paola (author), Holz, Ralph (author), Kuipers, F.A. (author), Hui Xue, Janet (author), Jonker, Mattijs (author), de Ruiter, Joeri (author), Sperotto, Anna (author), van Rijswijk‑Deij, Roland (author), Moreira Moura, G.C. (author), Pras, Aiko (author), de Laat, Cees (author)
Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of...
journal article 2020
document
Adjodha, Sharwan (author)
In the coming decades, more frequent and more extensive climate disasters such as coastal and river floods, droughts, extreme weather, and wildfires can be expected worldwide. Innovations will be required to face this grand challenge. The BRIGAID project developed a methodology consisting of a Test- and Implementation Framework and a set of...
master thesis 2019
Searched for: subject%3A%22cybersecurity%22
(1 - 20 of 41)

Pages