Search for dissertations about: "Malicious"
Showing result 1 - 5 of 72 swedish dissertations containing the word Malicious.
-
1. On Measurement and Analysis of Internet Backbone Traffic
Abstract : In the last decade, the Internet emerged undoubtedly as the key component for commercialand personal communication. The success of the Internet is mainly based on its versatilityand flexibility, allowing for the development of network applications ranging from simpletext based utilities to complex systems for e-commerce and multi-media content. READ MORE
-
2. Secure and Privacy Preserving Urban Sensing Systems
Abstract : The emergence of resource-rich mobile devices and smart vehicles has paved the way for Urban Sensing. In this new paradigm, users sense their environment and become part of an unprecedented large-scale network of sensors, with extensive spatial and temporal coverage, that enables the collection and dissemination of real-time information, practically, from anywhere. READ MORE
-
3. Securing the Foundations of Practical Information Flow Control
Abstract : Language-based information flow control (IFC) promises to secure computer programs against malicious or incompetent programmers by addressing key shortcomings of modern programming languages. In spite of showing great promise, the field remains under-utilised in practise. READ MORE
-
4. Security Allocation in Networked Control Systems
Abstract : Sustained use of critical infrastructure, such as electrical power and water distribution networks, requires efficient management and control. Facilitated by the advancements in computational devices and non-proprietary communication technology, such as the Internet, the efficient operation of critical infrastructure relies on network decomposition into interconnected subsystems, thus forming networked control systems. READ MORE
-
5. Classification of Potentially Unwanted Programs Using Supervised Learning
Abstract : Malicious software authors have shifted their focus from illegal and clearly malicious software to potentially unwanted programs (PUPs) to earn revenue. PUPs blur the border between legitimate and illegitimate programs and thus fall into a grey zone. READ MORE