Дисертації з теми "Threat of information leakage"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Threat of information leakage".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Лобанов, Сергій Олександрович. "Удосконалені методи автентифікації в системах обміну миттєвими повідомленнями". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27191.
Повний текст джерелаThe work includes 104 pages, 2 images, 16 links and 25 tables. The object of research are user authentication and their messages authentication based on extracted behavioral patterns during communication at instant messaging services. The subject of this qualification is multifactor authentication methods and improvement approaches for machine learning classification methods of user messages authentication by analyzing the characteristics of dialogue in order to use the key features of dialogue in the applications of instant messaging. The aim of this qualification work is improvement of security of instant messaging systems by building of mechanism with reliable methods of user authentication and improved messages authentication methods for prevention of information leakage based on extracted behavioral patterns of users during communication at instant messaging services. Methods of research are analysis and comparison of multifactor authentication methods for users and messages based on user behavioral patterns extraction by analyzing of user dialogues during messaging, building of mechanism for user and message authentication. The result of the work is a system with the multifactor authentication and improved messages authentication information leakage prevention during instant messaging.
Khan, Ajmal. "School Shooting : Threat Detection and Classification in Textual Leakage." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-207622.
Повний текст джерелаSmith, Adam (Adam Davidson) 1977. "Maintaining secrecy when information leakage is unavoidable." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28744.
Повний текст джерелаIncludes bibliographical references (p. 109-115).
(cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate vector is close to the input. One of the technical contributions of this research is to provide new, cryptographic uses of mathematical tools from complexity theory known as randomness extractors.
Sharing and maintaining long, random keys is one of the central problems in cryptography. This thesis provides about ensuring the security of a cryptographic key when partial information about it has been, or must be, leaked to an adversary. We consider two basic approaches: 1. Extracting a new, shorter, secret key from one that has been partially compromised. Specifically, we study the use of noisy data, such as biometrics and personal information, as cryptographic keys. Such data can vary drastically from one measurement to the next. We would like to store enough information to handle these variations, without having to rely on any secure storage-in particular, without storing the key itself in the clear. We solve the problem by casting it in terms of key extraction. We give a precise definition of what "security" should mean in this setting, and design practical, general solutions with rigorous analyses. Prior to this work, no solutions were known with satisfactory provable security guarantees. 2. Ensuring that whatever is revealed is not actually useful. This is most relevant when the key itself is sensitive-for example when it is based on a person's iris scan or Social Security Number. This second approach requires the user to have some control over exactly what information is revealed, but this is often the case: for example, if the user must reveal enough information to allow another user to correct errors in a corrupted key. How can the user ensure that whatever information the adversary learns is not useful to her? We answer by developing a theoretical framework for separating leaked information from useful information. Our definition strengthens the notion of entropic security, considered before in a few different contexts.
by Adam Davison Smith.
Ph.D.
LUO, Huajiang. "Information leakage and sharing in decentralized systems." Digital Commons @ Lingnan University, 2018. https://commons.ln.edu.hk/otd/35.
Повний текст джерелаWampler, Christopher. "Information leakage in encrypted IP video traffic." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/54287.
Повний текст джерелаMartinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Повний текст джерелаLUO, Huajiang. "Information leakage and Stackelberg leadership in Cournot competition." Digital Commons @ Lingnan University, 2015. https://commons.ln.edu.hk/cds_etd/12.
Повний текст джерелаWoods, Richard David. "Collective responses to acoustic threat information in jackdaws." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/25978.
Повний текст джерелаOgren, Joel G. Langevin James R. "Responding to the threat of cyberterrorism through information assurance /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366792.
Повний текст джерела"June 1999". Thesis advisor(s): John S. Osmundson, Timothy J. Shimeall. Includes bibliographical references (p. 69-73). Also available online.
Ogren, Joel G., and James R. Langevin. "Responding to the threat of cyberterrorism through information assurance." Thesis, Monterey, California: Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13544.
Повний текст джерелаThe number of people connecting to the Internet is growing at an astounding rate: estimates range from 100% to 400% annually over the next five years. This unprecedented level of interconnectedness has brought with it the specter of a new threat: cyberterrorism. This thesis examines the impact of this threat on the critical infrastructure of the United States, specifically focusing on Department of Defense issues and the National Information Infrastructure (NII). A working definition for cyberterrorism is derived, and a description of the Nation's critical infrastructure is provided. A number of possible measures for countering the threat of cyberterrorism are discussed, with particular attention given to the concept of information assurance. Information assurance demands that trustworthy systems be developed from untrustworthy components within power generation systems, banking, transportation, emergency services, and telecommunications. The importance of vulnerability testing (or red teaming) is emphasized as part of the concept of information assurance. To support this, a cyberterrorist red team was formed to participate in the Marine Corps' Urban Warrior Experiment. The objective of this thesis is to address the impact of these issues from a Systems Management perspective. This includes taking into account the changes that must occur in order to improve the U.S.' ability to detect, protect against, contain, neutralize, mitigate the effects of and recover from attacks on the Nation's Critical Infrastructure.
Kondo, Daishi. "Preventing information leakage in NDN with name and flow filters." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0233/document.
Повний текст джерелаIn recent years, Named Data Networking (NDN) has emerged as one of the most promising future networking architectures. To be adopted at Internet scale, NDN needs to resolve the inherent issues of the current Internet. Since information leakage from an enterprise is one of the big issues even in the Internet and it is very crucial to assess the risk before replacing the Internet with NDN completely, this thesis investigates whether a new security threat causing the information leakage can happen in NDN. Assuming that (i) a computer is located in the enterprise network that is based on an NDN architecture, (ii) the computer has already been compromised by suspicious media such as a malicious email, and (iii) the company installs a firewall connected to the NDN-based future Internet, this thesis focuses on a situation that the compromised computer (i.e., malware) attempts to send leaked data to the outside attacker. The contributions of this thesis are fivefold. Firstly, this thesis proposes an information leakage attack through a Data and through an Interest in NDN. Secondly, in order to address the information leakage attack, this thesis proposes an NDN firewall which monitors and processes the NDN traffic coming from the consumers with the whitelist and blacklist. Thirdly, this thesis proposes an NDN name filter to classify a name in the Interest as legitimate or not. The name filter can, indeed, reduce the throughput per Interest, but to ameliorate the speed of this attack, malware can send numerous Interests within a short period of time. Moreover, the malware can even exploit an Interest with an explicit payload in the name (like an HTTP POST message in the Internet), which is out of scope in the proposed name filter and can increase the information leakage throughput by adopting a longer payload. To take traffic flow to the NDN firewall from the consumer into account, fourthly, this thesis proposes an NDN flow monitored at an NDN firewall. Fifthly, in order to deal with the drawbacks of the NDN name filter, this thesis proposes an NDN flow filter to classify a flow as legitimate or not. The performance evaluation shows that the flow filter complements the name filter and greatly chokes the information leakage throughput
Kelkar, Soham P. "Detecting Information Leakage in Android Malware Using Static Taint Analysis." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1514202750763563.
Повний текст джерелаNovakovic, Christopher. "Computing and estimating information leakage with a quantitative point-to-point information flow model." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/5900/.
Повний текст джерелаNewman, William Arthur. "Risk/threat based analysis auditing in advanced management information systems." Thesis, University of Canterbury. Accounting and Information Systems, 1986. http://hdl.handle.net/10092/3761.
Повний текст джерелаCallahan, Christopher J. "Security information and event management tools and insider threat detection." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37596.
Повний текст джерелаMalicious insider activities on military networks can pose a threat to military operations. Early identification of malicious insiders assists in preventing significant damage and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential malicious insider activities. SIEM tools provide the ability to normalize and correlate log data from multiple sources on networks. Personnel background investigations and administrative action information can provide data sources for SIEM tools in order to assist in early identification of the insider threat by correlating this information with the individuals online activities. This thesis provides background information on the components and functionality of SIEM tools, summarizes historic insider threat cases to determine common motivations, provides an overview of military security investigations and administrative actions in order to determine candidate sources for SIEM correlation, and provides an overview of common methods of data exfiltration by malicious insiders. This information is then used to develop an example SIEM architecture that highlights how the military can use a SIEM to identify and prevent potential internal insider threats by correlating an individuals network activities with background investigation and administrative action information.
Bishop, Stephen. "A Multi-Agent Architecture for Information Leakage Detection in Distributed Systems." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1967911841&sid=1&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Повний текст джерелаChen, Han. "Quantitative information flow, maximum leakage and its applications to anonymity protocols." Thesis, Queen Mary, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509676.
Повний текст джерелаSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Повний текст джерелаMalicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.
Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.
Lamb, Christopher J. "Use of double-loop learning to combat advanced persistent threat| Multiple case studies." Thesis, Capella University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3607034.
Повний текст джерелаThe Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal incident response processes designed to combat the APT. Two cases were examined within organizations employing an internal incident response team. The third case was examined from an organization providing incident response as a service in addressing APT compromises. The study developed four themes: the inefficacy of single-loop learning in addressing APT, the need for better visibility within corporate infrastructure, the need for continuous improvement and bi-directional knowledge flow, and the need for effective knowledge management. Based on these themes, a conceptual model was developed modifying the traditional incident response process. Three implications were derived from the research. First, perimeter defense falls short when addressing the APT. Second, the preparation phase of incident response requires modification along with the addition of a new baseline loop phase running contiguously with the entire process. Finally, opportunistic learning needs to be encouraged in addressing the APT.
Gylling, Andreas. "Enriching Attack Models with Cyber Threat Intelligence." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284249.
Повний текст джерелаNär cyberhoten växer och det finns begränsade resurser att motverka dessamåste organisationer och företag finna sätt att testa säkerheten i sina systemför att ta förebyggande beslut och skydda sig mot hoten innan attackerna sker.Hotmodellering är ett sätt att göra detta då det formar attackgrafer som visualiseraren attackerares förflyttning i systemen.Cyber Threat Intelligence (CTI) är ett sätt för oss att förstå de hot vi står inför,men har liten integration med attackgrafer. Detta examensarbete försöker lösadetta genom att se hur CTI-strömmar av kända attackerare kan användas för attberika attackgrafer i hotmodelleringsverktyget securiCAD. Syftet med detta ärför att låta säkerthetsanalytiker analysera och stärka deras system mot the metodersom används av någon attackerare som tros vara ett hot mot dem. Dettaär även ett mål i ett större EU-projekt SOCCRATES som detta examensarbeteär en del av.Detta resulterade i ett verktyg som genererar attackerarprofiler, vilket användsför att justera de underliggande parametrarna i securiCADs attacksteg. Dessaattackerarprofiler baseras på en attackerares förmågor och tekniker, där teknikerär en metod för att åtstakomma specifika attacksteg. Attackerarprofilernakan i sin tur integreras med securiCAD för att utvärdera säkerheten i modellenmed avseende på en känd attackerare.I securiCAD körs simuleringar där sekvenser av attacksteg sätts upp, som medhjälp av sannolikhet formar potentiella attackvägar tagna av attackeraren. Resultatengav bevis på att den generade attackerarprofilen representerade denkända attackerarens tillvägagångssätt i simuleringarna. Detta resulterade i ettbevis på att integrera CTI med hotmodellering kan hjälpa säkerhetsanalytikeratt utvärdera sina system och ta förebyggande beslut för att stärka upp systemenfrån aktuella attacker av en attackerare som tros vara ett hot mot dem.
Haglind, Carl. "Evaluation and Implementation of Traceable Uncertainty for Threat Evaluation." Thesis, Uppsala universitet, Avdelningen för systemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-228106.
Повний текст джерелаOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Повний текст джерелаFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Ho, Zuleita K. M., Eduard A. Jorswieck, and Sabrina Engelmann. "Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-128447.
Повний текст джерелаNusinov, Michael Cooper. "Visualizing threat and impact assessment to improve situation awareness /." Online version of thesis, 2009. http://hdl.handle.net/1850/11245.
Повний текст джерелаGilliam, Billy Paul. "Threat Intelligence in Support of Cyber Situation Awareness." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4493.
Повний текст джерелаJamal, Arshad. "Understanding privacy leakage concerns in Facebook : a longitudinal case study." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/7609.
Повний текст джерелаGopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.
Повний текст джерелаBorger, Sharon C. "Attentional bias for threat information and anxiety sensitivity in a nonclinical sample." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ56112.pdf.
Повний текст джерелаChambers, Cortney M. "Sharing of Threat-Related Information Among Public Safety Agencies in Honolulu, Hawaii." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7615.
Повний текст джерелаFellner, Gerlinde, Rupert Sausgruber, and Christian Traxler. "Testing Enforcement Strategies in the Field: Threat, Moral Appeal and Social Information." Wiley, 2013. http://dx.doi.org/10.1111/jeea.12013.
Повний текст джерелаPreston, Jennifer Leigh. "Is attentional bias towards threat a hallmark of chronic worry?" Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1153692231.
Повний текст джерелаMcMillan, Elaine S. "Processing Social Information: An Investigation of the Modification of Attentional Biases in Social Anxiety." Fogler Library, University of Maine, 2008. http://www.library.umaine.edu/theses/pdf/McMillanES2008.pdf.
Повний текст джерелаAdewopo, Victor A. "Exploring Open Source Intelligence for cyber threat Prediction." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin162491804723753.
Повний текст джерелаTittle, Jacob. "Potable Water Leakage Prediction and Detection using Geospatial Analysis." Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etd/3663.
Повний текст джерелаNaryshkin, Konstantin. "Study on the Leakage of Private User Information Via a Range of Popular Websites." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/1145.
Повний текст джерелаSilva, Ana Teresa Maia. "Commoditization: a threat or an opportunity?: a case study on IBM." Master's thesis, NSBE - UNL, 2014. http://hdl.handle.net/10362/11810.
Повний текст джерелаThe purpose of this work project is to analyze the concept of commoditization in the information technology industry (IT). It is based on a case study that describes how IBM, a successful company for more than seventy years, was affected by the commoditization of the personal computer segment in the early 1990s and the strategic transformation undertook by the company to overcome this problem. Furthermore, it is also emphasized IBM’s decisions to exit commoditized segments and to shift its portfolio towards services and software, due to their major contribution in bringing the company back to its leading position in the marketplace.
Smith, Matthew N. "Developing a reliable methodology for assessing the computer network operations threat of Iran." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2065.
Повний текст джерелаJefford-Baker, Jonathan. "ALCOL : Probabilistic Threat Modelling of the Amazon Elastic Container Service Domain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261421.
Повний текст джерелаMolntjänster blir en alltmer populär beräkningsmodell för IT-infrastrukturer vilket har ändrat uppfattningen kring innebörden av beräkningsresurser. Ett annat koncept som blivit populärt är containers vilket möjliggör exekvering av applikationer som är isolerade från varandra trots att de båda använder värddatorns operativsystemkärna. Dessa två koncept har blivit kombinerade till att exekvera containermiljöer i molnet, en molntjänst som blivit populär bland kunder. Den ökade driftsättningen av IT-infrastrukturer baserade på molnmiljöer som exekverar containers resulterar i en ökad exponering mot cyberattacker inom denna domän vilket kräver lämpliga säkerhetsåtgärder. Att bedöma säkerheten i ett system kan däremot vara svårt. Attacksimuleringar kan användas för att förenkla denna process genom att ge en överblick av hur en attackerare kan attackera systemet. Detta examensarbete presenterar ett probabilistiskt hotmodelleringsspråk som kan användas för att simulera attacker mot infrastrukturer baserade på Amazon Elastic Container Service (ECS), en molntjänst som tillhandahålls av Amazon Web Services som möjliggör för användare att exekvera applikationer i containers i molnet. Språket, som kallas ALCOL (Amazon eLastic COntainer Language), är baserat på Meta Attack Language och det domänspecifika språket AWSLang. Språket utvecklades genom att flera litteraturstudier gjordes för att undersöka vilka komponenter i Amazon ECS som skulle modelleras i språket samt för att hitta alla attacker som kan utföras mot infrastrukturer baserade på Amazon ECS. Språket evaluerades genom testfall som representerade olika attackscenarion samt genom en intervju med en domänexpert. Det utvecklade språket kan på ett korrekt sätt simulera cyberattacker mot infrastrukturer baserade på Amazon ECS, dock med vissa begränsningar, vilket resulterade i förslag på framtida forskning.
Balsom, Rodney V. "Information processing of health threat stimuli in the individuals high in negative affectivity." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0004/NQ42494.pdf.
Повний текст джерелаFraunholz, Daniel [Verfasser]. "The Deceptive Angle: Threat Intelligence and Resiliency for Industrial Information Assurance / Daniel Fraunholz." München : Verlag Dr. Hut, 2019. http://d-nb.info/1194288707/34.
Повний текст джерелаCastillo, Alfred. "Respondent Perceived Threat During the Information Systems Requirements Determination Process: Understanding and Mitigation." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3549.
Повний текст джерелаForrester, Vivienne. "User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1079.
Повний текст джерелаMagklaras, Georgios Vasilios. "An insider misuse threat detection and prediction language." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/1024.
Повний текст джерелаBrown, Christopher. "Developing a reliable methodology for assessing the computer network operations threat of North Korea." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FBrown.pdf.
Повний текст джерелаPreston, Jennifer L. "Is attentional bias towards threat a hallmark of chronic worry?" The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1153692231.
Повний текст джерелаLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Повний текст джерелаLi, Xin. "Computer viruses: The threat today and the expected future." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1998.
Повний текст джерелаThis Master’s Thesis within the area computer security concerns ”Computer viruses: The threat today and the expected future”.
Firstly, the definitions of computer virus and the related threats are presented; Secondly, current situation of computer viruses are discussed, the working and spreading mechanisms of computer viruses are reviewed in details, simplistic attitude of computer world in computer virus defence is analyzed; Thirdly, today’s influencing factors for near future computer virus epidemics are explained, then it further predicts new possible types of computer viruses in the near future; Furthermore, currently available anti-virus technologies are analyzed concerning both advantages and disadvantages; Finally, new promising trends in computer virus defence are explored in details.
Ho, Zuleita, Eduard Jorswieck, and Sabrina Engelmann. "Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-121245.
Повний текст джерелаZhang, Hui. "Corporate governance, firm performance, and information leakage : an empirical analysis of the Chinese stock market." Thesis, University of Plymouth, 2012. http://hdl.handle.net/10026.1/922.
Повний текст джерела