Searched for: subject%3A%22cybersecurity%22
(1 - 16 of 16)
document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Oosthoek, K. (author)
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly affected individuals, companies, governments and critical infrastructure. It has led to significant financial damage, impeded critical infrastructure and harmed human lives. Defending against cybercrime is difficult, as persistent actors perpetually...
doctoral thesis 2023
document
Nowroozi, Ehsan (author), Mohammadi, Mohammadreza (author), Savas, Erkay (author), Mekdad, Yassine (author), Conti, M. (author)
In the past few years, Convolutional Neural Networks (CNN) have demonstrated promising performance in various real-world cybersecurity applications, such as network and multimedia security. However, the underlying fragility of CNN structures poses major security problems, making them inappropriate for use in security-oriented applications,...
journal article 2023
document
Christiansen, L.V.C. (author), Bharosa, Nitesh (author), Janssen, M.F.W.H.A. (author)
As the development of quantum computers advances, actors relying on public key infrastructures (PKI) for secure information exchange are becoming aware of the disruptive implications. Currently, governments and businesses employ PKI for many core processes that may become insecure or unavailable when quantum computers break the cryptographic...
conference paper 2023
document
Nadeem, A. (author), Vos, D.A. (author), Cao, C.S. (author), Pajola, Luca (author), Dieck, S. (author), Baumgartner, R. (author), Verwer, S.E. (author)
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive cybersecurity tasks. We identify 3 cybersecurity stakeholders, i.e., model users, designers,...
conference paper 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Herrera Semenets, V. (author), Hernández-León, Raudel (author), Bustio-Martínez, Lázaro (author), van den Berg, Jan (author)
Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling...
conference paper 2022
document
Janssen, M.F.W.H.A. (author)
Governments are confronted with all kinds of changes in their digital environment, such as pandemics, fake news, and security breaches. These changes come with many uncertainties and are hard to predict, whereas decisions need to be made quickly to avoid a negative impact. Adaptive governance embraces uncertainty and complexity by enabling...
conference paper 2022
document
Roeling, M.P. (author)
This thesis presents several methodological and statistical solutions to problems encountered in cyber security. We investigated the effects of compromised data veracity in state estimators and fraud detection systems, a model to impute missing data in attributes of linked observations, and an unsupervised approach to detect infected machines in...
doctoral thesis 2021
document
Rao, Vivek (author), Moore, George (author), Jung, Hyun Jie (author), Kim, E.Y. (author), Agogino, Alice (author), Goucher-Lambert, Kosa (author)
Increasingly digital products and services make cybersecurity a crucial issue for designers. However, human-centered designers struggle to consider it in their work, partially a consequence of the high psychological distance between designers and cybersecurity. In this work, we build on the Design for Cybersecurity (DfC) Cards, an...
journal article 2021
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
van den Berg, Jan (author)
For most people, cybersecurity is a difficult notion to grasp. Traditionally, cybersecurity has been considered a technical challenge, and still many specialists understand it as information security, with the notions of confidentiality, integrity, and availability as its foundation. Although many have searched for different and broader...
journal article 2020
document
Hesselman, Cristian (author), Grosso, Paola (author), Holz, Ralph (author), Kuipers, F.A. (author), Hui Xue, Janet (author), Jonker, Mattijs (author), de Ruiter, Joeri (author), Sperotto, Anna (author), van Rijswijk‑Deij, Roland (author), Moura, Giovane C. M. (author), Pras, Aiko (author), de Laat, Cees (author)
Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of...
journal article 2020
document
Viganò, Eleonora (author), Loi, Michele (author), Yaghmaei, E. (author)
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity in national security, with a focus on the ethics of surveillance for protecting critical infrastructures and the use of AI. A bibliographic analysis...
book chapter 2020
document
van den Berg, Jan (author)
For most people, cybersecurity is a hard to grasp notion. Traditionally, cybersecurity has been considered as a technical challenge and still many specialists view it equivalent with information security, with the notions of confidentiality, integrity and availability as starting points of thinking. And although others searched for a broader...
conference paper 2019
document
Christen, Markus (author), Gordijn, Bert (author), Weber, Karsten (author), van de Poel, I.R. (author), Yaghmaei, E. (author)
Cybersecurity is of capital importance in a world where economic and social processes increasingly rely on digital technology. Although the primary ethical motivation of cybersecurity is prevention of informational or physical harm, its enforcement can also entail conflicts with other moral values. This contribution provides an outline of value...
journal article 2017
Searched for: subject%3A%22cybersecurity%22
(1 - 16 of 16)