Search for dissertations about: "probabilistic security"
Showing result 1 - 5 of 18 swedish dissertations containing the words probabilistic security.
-
1. A framework and theory for cyber security assessments
Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE
-
2. Design and Analysis of Self-protection : Adaptive Security for Software Systems
Abstract : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. READ MORE
-
3. Probabilistic security management for power system operations with large amounts of wind power
Abstract : Power systems are critical infrastructures for the society. They are therefore planned and operated to provide a reliable eletricity delivery. The set of tools and methods to do so are gathered under security management and are designed to ensure that all operating constraints are fulfilled at all times. READ MORE
-
4. Design and Analysis of Self-protection : Adaptive Security for Software-Intensive Systems
Abstract : Today’s software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty. Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence, while their consequences are often severe. READ MORE
-
5. Guesswork and Entropy as Security Measures for Selective Encryption
Abstract : More and more effort is being spent on security improvements in today's computer environments, with the aim to achieve an appropriate level of security. However, for small computing devices it might be necessary to reduce the computational cost imposed by security in order to gain reasonable performance and/or energy consumption. READ MORE