Search for dissertations about: "probabilistic security"

Showing result 1 - 5 of 18 swedish dissertations containing the words probabilistic security.

  1. 1. A framework and theory for cyber security assessments

    Author : Teodor Sommestad; Mathias Ekstedt; Ruth Breu; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cyber security; security assessment; vulnerability assessment; architecture modeling; enterprise architecture;

    Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE

  2. 2. Design and Analysis of Self-protection : Adaptive Security for Software Systems

    Author : Charilaos Skandylas; Narges Khakpour; Simin Nadjm-Tehrani; Linnéuniversitetet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security Analysis; Self-Protection; Self-adaptive Systems; Verification; Information Flow Control; Risk Assessment; Computer Science; Datavetenskap;

    Abstract : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. READ MORE

  3. 3. Probabilistic security management for power system operations with large amounts of wind power

    Author : Camille Hamon; Lennart Söder; Louis Wehenkel; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Power systems; wind power; probabilistic security management; chance-constrained optimal power flow; monte-carlo; importance sampling; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Power systems are critical infrastructures for the society. They are therefore planned and operated to provide a reliable eletricity delivery. The set of tools and methods to do so are gathered under security management and are designed to ensure that all operating constraints are fulfilled at all times. READ MORE

  4. 4. Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems

    Author : Charilaos Skandylas; Welf Löwe; Narges Khakpour; Jesper Andersson; Javier Camara Moreno; Linnéuniversitetet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Self-Protection; Security Analysis; Self-Adaptation; Computer Science; Datavetenskap;

    Abstract : Today’s software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty. Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence, while their consequences are often severe. READ MORE

  5. 5. Guesswork and Entropy as Security Measures for Selective Encryption

    Author : Reine Lundin; Stefan Lindskog; Svein Knapskog; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; selective encryption; confidentiality; entropy; guesswork.; Computer Science; Datavetenskap;

    Abstract : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. READ MORE