Search for dissertations about: "cyber attacks"
Showing result 1 - 5 of 39 swedish dissertations containing the words cyber attacks.
-
1. Security metrics and allocation of security resources for control systems
Abstract : Achieving a sufficient level of security of control systems is very important, yet challenging. Firstly, control systems operate critical infrastructures vital for our society. Hence, attacks against them can result in dire consequences. READ MORE
-
2. Analysis, Detection, and Mitigation of Attacks in Cyber-physical Systems
Abstract : Cyber-Physical Systems (CPS) offer close integration among computational elements, communication networks, and physical processes. Such systems play an increasingly important role in a large variety of fields, such as manufacturing, health care, environment, transportation, defence, and so on. READ MORE
-
3. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles
Abstract : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. READ MORE
-
4. Toward Cyber-Secure and Resilient Networked Control Systems
Abstract : Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. READ MORE
-
5. On the Virtual Borderline: Cyber Operations and their Impact on the Paradigms for Peace and War : Aspects of International and Swedish Domestic Law
Abstract : Contemporary disputes between states contain elements of psychological and information operations, intelligence operations and cyber operations as well as methods for physical use of force. Cyber operations may use, or contribute to, all of these different techniques and methods combined and can be focused on intelligence gathering, preparation of networks for future attacks, sabotage or on preventing access to information. READ MORE