Searched for: subject%3A%22security%22
(81 - 100 of 557)

Pages

document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
Wu, Chengwei (author), Yao, Weiran (author), Luo, Wensheng (author), Pan, W. (author), Sun, Guanghui (author), Xie, Hui (author), Wu, Ligang (author)
The problem of learning-based control for robots has been extensively studied, whereas the security issue under malicious adversaries has not been paid much attention to. Malicious adversaries can invade intelligent devices and communication networks used in robots, causing incidents, achieving illegal objectives, and even injuring people....
journal article 2023
document
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)
IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...
conference paper 2023
document
Wei, Xiaoguang (author), Liu, Y. (author), Shi, Jian (author), Gao, Shibin (author), Li, Xingpeng (author), Han, Zhu (author)
This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of...
journal article 2023
document
Iaiani, Matteo (author), Tugnoli, Alessandro (author), Cozzani, Valerio (author), Reniers, G.L.L.M.E. (author), Yang, M. (author)
Offshore Oil&Gas facilities are attractive targets of intentional malicious attacks (security attacks) that may trigger cascading events (e.g., the release and dispersion of hazardous material and/or energy, fires, explosions) with consequences on people, environment, and assets. The severity of these consequences is potentially similar to...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Siddiqi, M.A. (author), Hernández, Jan Andrés Galvan (author), Gebregiorgis, A.B. (author), Bishnoi, R.K. (author), Strydis, C. (author), Hamdioui, S. (author), Taouil, M. (author)
Next-generation personalized healthcare devices are undergoing extreme miniaturization in order to improve user acceptability. However, such developments make it difficult to incorporate cryptographic primitives using available target tech-nologies since these algorithms are notorious for their energy consumption. Besides, strengthening these...
conference paper 2023
document
Miedema, Fieke (author)
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, ensure a smooth operation of business? Avalanche had the attention of security researchers and law enforcement, yet it managed to persevere for a long period of time.<br/>In this work, we answer this question by analyzing Avalanche’s security...
master thesis 2022
document
Singirankabo, U.A. (author)
This PhD study aims to assess the relations between land tenure security, farmland use and agricultural productivity. Using a locally-defined research approach, the study explores those relations from a review of the literature to a case study in Rwanda. Therefore, the case study includes four research sites: Gatwe, Nyabubare, Rusebeya and...
doctoral thesis 2022
document
Galvan Hernández, Jan Andres (author)
The recent advances in the semiconductor industry have given rise to the development of highly scalable, wireless and battery-free neural-implant interfaces that enable brain monitoring and brain stimulation with high spatial and temporal resolution. Such implants are referred to as Free-Floating Neural Implants (FFNI), as the small size and...
master thesis 2022
document
Pulles, Annemijn (author)
Due to the increasing use of Internet-of-Things (IoT) devices people have created an entirely new digital world for themselves. However, the security and privacy risk in this world are emerging. People using smart devices for everything in their lives are not realising that every interaction is collected and stored in databases. This study has...
master thesis 2022
document
Fouladvand, J. (author)
This thesis aims to support the design and implementation of energy-secure thermal energy communities (TEC) by investigating their technical, behavioural and institutional settings through a collective action perspective. The thesis shows that energy-secure TEC initiatives are collective energy systems with particular characteristics and...
doctoral thesis 2022
document
Griffioen, H.J. (author)
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together with the rise of premade tools to perform exploits, the number of cyber incidents grows rapidly each year. Defending against these threats becomes increasingly difficult as organizations depend heavily on the Internet and have many different...
doctoral thesis 2022
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Huijsinga, Martha (author)
The Russian invasion of Ukraine has created a renewed focus on both climate change and security of supply of energy. The European Commission’s Green Deal highlights the importance of the clean energy carrier ’low-carbon hydrogen’ to combat climate change. Simultaneously, in the new REPowerEU package, the European Commission emphasises the...
master thesis 2022
document
Tian, Yuhang (author)
In this work, we propose FLVoogd, an updated federated learning method in which servers and clients collaboratively eliminate Byzantine attacks while preserving privacy. In particular, servers use automatic Density-based Spatial Clustering of Applications with Noise (DBSCAN) combined with S2PC to cluster the benign majority without acquiring...
master thesis 2022
document
van Engelen, Yves (author)
In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in software products. However, organisations struggle with the best...
master thesis 2022
document
Al-Kaswan, Ali (author)
Reverse engineering binaries is required to understand and analyse programs for which the source code is unavailable. Decompilers can transform the largely unreadable binaries into a more readable source code-like representation. However, many aspects of source code, such as variable names and comments, are lost during the compilation and...
master thesis 2022
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
Searched for: subject%3A%22security%22
(81 - 100 of 557)

Pages