Search for dissertations about: "cyber attack"
Showing result 1 - 5 of 31 swedish dissertations containing the words cyber attack.
-
1. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE
-
2. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law
Abstract : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. READ MORE
-
3. Toward Cyber-Secure and Resilient Networked Control Systems
Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE
-
4. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
5. Anomaly Detection and its Adaptation : Studies on Cyber-Physical Systems
Abstract : Cyber-Physical Systems (CPS) are complex systems where physical operations are supported and coordinated by Information and Communication Technology (ICT).From the point of view of security, ICT technology offers new opportunities to increase vigilance and real-time responsiveness to physical security faults. READ MORE