Search for dissertations about: "ransomware"

Found 3 swedish dissertations containing the word ransomware.

  1. 1. Towards Automated Context-aware Vulnerability Risk Management

    Author : Vida Ahmadi Mehri; Emiliano Casalicchio; Patrik Arlos; Stefan Axelsson; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Vulnerability Risk Management; VRM; Automated Context-Aware Vulnerability Risk Management; ACVRM; Information security; Computer Science; Datavetenskap;

    Abstract : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. READ MORE

  2. 2. Vulnerability Analysis for Critical Infrastructures

    Author : Yuning Jiang; Yacine Atif; Jianguo Ding; Manfred A. Jeusfeld; Birgitta Lindström; Christoffer Brax; Sokratis Katsikas; Högskolan i Skövde; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; critical infrastructure cybersecurity; vulnerability assessment; vulnerability quantification; computational intelligence in cybersecurity; cyber-physical system; INF303 Informationssäkerhet; INF303 Information Security; INF301 Data Science; INF301 Data Science; Distribuerade realtidssystem DRTS ; Distributed Real-Time Systems;

    Abstract : The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. READ MORE

  3. 3. Mobile Device Security with ARM TrustZone

    Author : Sileshi Demesie Yalew; Seif Haridi; Miguel Correia; Mário Freire; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Android; ARM TrustZone; Malware Mobile Devices; Mobile Security; Trusted Computing;

    Abstract : Mobile devices such as smartphones are becoming the majority of computing devices due to their evolving capabilities. Currently, service providers such as nancial and healthcare institutions oer services to their clients using smartphone applications (apps). Many of these apps run on Android, the most adopted mobile operating system (OS) today. READ MORE