Search for dissertations about: "Malicious"

Showing result 1 - 5 of 72 swedish dissertations containing the word Malicious.

  1. 1. On Measurement and Analysis of Internet Backbone Traffic

    Author : Wolfgang John; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Packet Header; Internet Backbone; Header Anomaly; Malicious Traffic; Connection Behavior; Peer-to-Peer; Measurement; Passive; Classification; Traffic Analysis;

    Abstract : In the last decade, the Internet emerged undoubtedly as the key component for commercialand personal communication. The success of the Internet is mainly based on its versatilityand flexibility, allowing for the development of network applications ranging from simpletext based utilities to complex systems for e-commerce and multi-media content. READ MORE

  2. 2. Secure and Privacy Preserving Urban Sensing Systems

    Author : Stylianos Gisdakis; Panagiotis Papadimitratos; Matthias Hollick; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : The emergence of resource-rich mobile devices and smart vehicles has paved the way for Urban Sensing. In this new paradigm, users sense their environment and become part of an unprecedented large-scale network of sensors, with extensive spatial and temporal coverage, that enables the collection and dissemination of real-time information, practically, from anywhere. READ MORE

  3. 3. Securing the Foundations of Practical Information Flow Control

    Author : Maximilian Algehed; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Language-based information flow control (IFC) promises to secure computer programs against malicious or incompetent programmers by addressing key shortcomings of modern programming languages. In spite of showing great promise, the field remains under-utilised in practise. READ MORE

  4. 4. Security Allocation in Networked Control Systems

    Author : Anh Tung Nguyen; André Teixeira; Emma Tegling; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Elektroteknik med inriktning mot reglerteknik; Electrical Engineering with specialization in Automatic Control;

    Abstract : Sustained use of critical infrastructure, such as electrical power and water distribution networks, requires efficient management and control. Facilitated by the advancements in computational devices and non-proprietary communication technology, such as the Internet, the efficient operation of critical infrastructure relies on network decomposition into interconnected subsystems, thus forming networked control systems. READ MORE

  5. 5. Classification of Potentially Unwanted Programs Using Supervised Learning

    Author : Raja Muhammad Khurram Shahzad; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Malicious software authors have shifted their focus from illegal and clearly malicious software to potentially unwanted programs (PUPs) to earn revenue. PUPs blur the border between legitimate and illegitimate programs and thus fall into a grey zone. READ MORE