- document
-
Thomas, Wessel (author)Network Intrusion Detection Systems (NIDSs) defend our computer networks against malicious network attacks. Anomaly-based NIDSs use machine learning classifiers to categorise incoming traffic. Research has shown that classifiers are vulnerable to adversarial examples, perturbed inputs that lead the classifier into misclassifying the input....master thesis 2023
- document
-
van Wijk, Rijk (author)Forensics is the art of gathering evidence, which for electronics amounts to accurately recovering data. Often, this can only be archived with state-of-the-art hacking techniques.<br/>However, replicating state-of-the-art research in hardware security can be difficult, due to the large number of components and connections. To counter this, a...master thesis 2023
- document
-
Terwogt, Bram (author), Norman, Hannah (author), Khoroshev, Oleg (author), Von Zeska De Toledo, Paula (author), Lin, Xinyu (author)A transition is needed within the current agricultural sector. The intensive food production emits a significant amount of greenhouse gases, but also generates a nitrogen surplus. Consequently, biodiversity and soil quality have been decreasing dramatically in recent decades. One way of achieving a more sustainable food system is through...student report 2023
- document
-
Oortwijn, Joost (author)The rapid growth of internet-connected devices has led to a significant increase in the number of cyber attacks, resulting in security challenges related to IoT. Researchers have discovered a new attack technique that can be used for launching large DDoS attacks, which involves TCP reflective amplification by abusing middleboxes and IoT devices....master thesis 2023
- document
-
Bhargava, Anmol (author), Kramer, Bas (author), Kokolaki, GEORGIA (author), Xanthopoulos, Giorgos (author), Wahl-Mertes, Wanda (author)The current food production and distribution system has led to extensive degradation on both the global and local scale, requiring a transformation of the vast, urbanized rural - beyond just climate-change mitigation but radical regeneration. <br/>The ongoing intensive agricultural practices have contaminated air, soil, and water, while their...student report 2023
- document
-
Kruijsse, Hendrik Jan (author)Nowadays, the society strongly depends on computer networks and systems as a means of reliable communication and data storage. In order to maintain absolute security of the networks and thus the society, one would need to separate everything, but this is not feasible. Consequently, sharing of resources is inevitable. There are security products...master thesis 2023
- document
-
Keijzer, T. (author)Without us realizing it, solutions for safety and security are present all around us. However, everyone has undoubtedly also experienced how inconvenient some safety and security measures can be. For example, think about security checks at the airport, the need to wear a bicycle helmet, or being asked to perform 2-factor authentication to log...doctoral thesis 2023
- document
-
van den Eeden, Lars (author)The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucial to prevent and minimize the chances of attacks occurring....bachelor thesis 2023
- document
-
Couwenberg, Ruben (author)The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...bachelor thesis 2023
- document
-
Kramer, Tim (author)The dramatic increase in the number of Internet of Things (IoT) devices has created rapid growth for exploitation of security flaws and vulnerabilities. Particularly for critical infrastructure and real-time systems security threats can be highly damaging. Machine Learning (ML) algorithms have demonstrated the ability to combat the security...bachelor thesis 2023
- document
-
Yuan, S. (author), Reniers, G.L.L.M.E. (author), Yang, M. (author), Bai, Y. (author)Chemical plants face safety hazards and security threats that may induce catastrophic scenarios. Safety and security barriers are employed widely to protect chemical plants from accidental and intentional undesired events and mitigate consequences. Managing safety and security barriers effectively and economically is a research topic with...journal article 2023
- document
-
Westfalewicz, Andrzej (author)Software security plays a crucial role in the modern world governed by software. And while closed source projects can enjoy a sense of confidentiality when addressing security issues, open source projects undertake them publicly even though just as many projects rely on them. In 50% of documented cases, the vulnerabilities could have been...master thesis 2023
- document
-
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...journal article 2023
- document
-
Yang, Zhe (author), Liu, Zhou (author), Zhang, Qi (author), Chen, Zhe (author), de Jesus Chavez, Jose (author), Popov, M. (author)The traditional fault control strategy of converter-interfaced renewable energy sources (CIRESs) may bring about a lower sensitivity level or misoperation of fault component-based directional elements. To overcome this problem, a new control scheme is proposed to adjust sequence impedance angles of CIRESs by computing suitable current...journal article 2023
- document
-
Bugaje, A.-.A.B. (author), Cremer, Jochen (author), Strbac, Goran (author)Machine learning (ML) for real-time security assessment requires a diverse training database to be accurate for scenarios beyond historical records. Generating diverse operating conditions is highly relevant for the uncertain future of emerging power systems that are completely different to historical power systems. In response, for the first...journal article 2023
- document
-
Zhou, Junwei (author), Lei, Botian (author), Lang, Huile (author), Panaousis, Emmanouil (author), Liang, K. (author), Xiang, Jianwen (author)Genotype imputation estimates missing genotypes from the haplotype or genotype reference panel in individual genetic sequences, which boosts the potential of genome-wide association and is essential in genetic data analysis. However, the genetic sequences involve people's privacy, confirming an individual's identification and even disease...journal article 2023
- document
-
Iaiani, Matteo (author), Tugnoli, Alessandro (author), Cozzani, Valerio (author), Reniers, G.L.L.M.E. (author), Yang, M. (author)Offshore Oil&Gas facilities are attractive targets of intentional malicious attacks (security attacks) that may trigger cascading events (e.g., the release and dispersion of hazardous material and/or energy, fires, explosions) with consequences on people, environment, and assets. The severity of these consequences is potentially similar to...journal article 2023
- document
-
Fernandes, Maria (author), Decouchant, J.E.A.P. (author), Couto, Francisco M. (author)DNA computing is an emerging field that aims at enabling more efficient data storage and processing. One principle of DNA computing is to encode some information (e.g., image, video, programming scripts) into a digital DNA-like sequence and then synthesize the corresponding DNA molecule. Synthesizing this molecule using digital or real human...book chapter 2023
- document
-
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...journal article 2023
- document
-
Gonzato, Sebastian (author), Bruninx, K. (author), Delarue, Erik (author)The potential contribution of short term storage technologies such as batteries to resource adequacy is becoming increasingly important in power systems with high penetrations of Variable Renewable Energy Sources (VRES). However, unlike generators, there are multiple ways in which storage may be operated to contribute to resource adequacy. We...journal article 2023