Search for dissertations about: "Security Mitigations"

Found 5 swedish dissertations containing the words Security Mitigations.

  1. 1. On Privacy and Security in Smart Connected Homes

    Author : Joseph Bugeja; Andreas Jacobsson; Paul Davidsson; Marc Langheinrich; Malmö universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; smart connected homes; Internet of Things; smart homes devices; smart home data; threat identification; risk analysis; privacy; security; vulnerability assessment; mitigations; threat agents;

    Abstract : The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, these devices continuously collect, process, and transmit data about the residents and their daily lifestyle activities to unknown parties outside the home. READ MORE

  2. 2. Smart connected homes : concepts, risks, and challenges

    Author : Joseph Bugeja; Jan Persson; Malmö universitet; []
    Keywords : Smart Connected Homes; Internet of Things; Smart Home Devices; Data Lifecycle; Security Risks; Privacy Management; Vulnerability Assessment; Security Mitigations; Threat Agents; Smart Home Services; System Architecture;

    Abstract : The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. READ MORE

  3. 3. Pre-deployment Description Logic-based Reasoning for Cloud Infrastructure Security

    Author : Claudia Cauli; Göteborgs universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Formal Methods; Automated Reasoning; Cloud; Security; Description Logic;

    Abstract : Ensuring the security of a cloud application is exceptionally challenging. Not only is cloud infrastructure inherently complex, but also a precise definition of what is secure is hard to give. READ MORE

  4. 4. Generating Optimized and Secure Binary Code

    Author : Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE

  5. 5. Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Data Streaming; Network Security; Overlay; Distributed Denial-of-Service; System Design; DDoS Detection; Distributed Computing;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. READ MORE