Search for dissertations about: "Threat Modeling"
Showing result 1 - 5 of 33 swedish dissertations containing the words Threat Modeling.
-
1. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE
-
2. Efficiency and Automation in Threat Analysis of Software Systems
Abstract : Context: Security is a growing concern in many organizations. Industries developing software systems plan for security early-on to minimize expensive code refactorings after deployment. In the design phase, teams of experts routinely analyze the system architecture and design to find potential security threats and flaws. READ MORE
-
3. Spatial Analysis and Modeling for Health Applications
Abstract : Despite the benefits of applying methods of geographic information science (GIScience), the use of such methods in health service planning and provision remains greatly underutilized. Spread of epidemic diseases is a constant threat to mankind and the globalization of the world increases the risk for global attacks from multi-resistant bacteria or deadly virus strains. READ MORE
-
4. Pharmacokinetic-Pharmacodynamic modeling and prediction of antibiotic effects
Abstract : Problems of emerging antibiotic resistance are becoming a serious threat worldwide, and at the same time, the interest to develop new antimicrobials has declined. There is consequently a need for efficient methods to develop new treatments that minimize the risk of resistance development and that are effective on infections caused by resistant strains. READ MORE
-
5. Towards Efficiency and Quality Assurance in Threat Analysis of Software Systems
Abstract : Context: Security threats have been a growing concern in many organizations. Organizations developing software products strive to plan for security as soon as possible to mitigate such potential threats. READ MORE