• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 257
  • 34
  • 11
  • 11
  • 8
  • 6
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 463
  • 168
  • 157
  • 152
  • 130
  • 92
  • 74
  • 68
  • 67
  • 59
  • 57
  • 57
  • 56
  • 52
  • 52
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Few-Shot Malware Detection Using A Novel Adversarial Reprogramming Model

Kumar, Ekula Praveen January 2022 (has links)
No description available.
212

Practical and Lightweight Defense Against Website Fingerprinting

McGuan, Colman January 2022 (has links)
No description available.
213

Towards Real-World Adversarial Examples in AI-Driven Cybersecurity

Liu, Hao January 2022 (has links)
No description available.
214

Cybersecurity of Maritime Communication Systems : Spoofing attacks against AIS and DSC

Forsberg, Joakim January 2022 (has links)
For a long time, ships have relied on navigators that could figure out their course andlocation based on seeing objects around them. However, this approach is limited to thenavigators’ ability, and with the increasing number of ships, this job becomes harder andharder. With these aspects in mind, the new system, the Automatic identification system(AIS), was created as a tool to help navigators to navigate and increase safety on the sea.AIS is an automatic identification system and is designed to send out information aboutthe vessel and its location. This thesis looks at the state of the art of Automatic identifica-tion systems and Digital selective calling systems to evaluate the security aspects of thesesystems. The thesis aims to investigate if these two systems are susceptible to spoofingattacks and what resources are required for creating successful attacks. Two experimentswere used to achieve this aim and answer the research questions. The first one was to eval-uate the Automatic identification system and test different spoofing attacks on that system.The second experiment was to test different spoofing attacks on the Digital selective callingsystem. Both of these experiments used two software-defined radios for the experiments.The experiment results show that some of the attacks tested on the systems were success-ful, and the attacks tested were successfully executed against the created system. Theseattacks were created and performed using two software-defined radios to send and receivemessages. To conclude, the two systems are susceptible to spoofing attacks. However, anattacker can gain the necessary information to create spoofing attacks on the systems, withvarying consequences and some limitations.
215

Towards an assessment of safety and security interplay in automated driving systems.

Skoglund, Martin January 2022 (has links)
We are currently in the midst of significant changes in the road transport system, including the transformation to fossil-free propulsion and the shift to higher levels of automation. The next level in automation is soon upon us and is encompassed by the broader term Connected, Cooperative and Automated Mobility (CCAM) which is relevant for the entire transportation system. The introduction of CCAM has the potential to contribute significantly to crucial UN Sustainable Development Goals. For the automotive domain, the term Automated Driving Systems (ADS) is often used for highly automated vehicles. Notwithstanding the expected positive effects and the extraordinary efforts, highly automated driving systems are still not publicly available except in pilot programs. The increased complexity in the higher automation levels can be ascribed to the shift from fail-safe operator support to fail-operational systems that assume the operator's role, utilising new sensors and algorithms for perception and the reliance on connectivity to solve the problem task. Here the solution is also the problem, i.e. complex systems. The complexity of the systems and difficulties in capturing a complete practical description of the environment where the systems are intended to operate pose difficulties in defining validation procedures for ADS technologies' safety, security, and trustworthiness. Parallel to traditional safety issues, there is now a need to consider the quality of cybersecurity, e.g. due to external communication and environmental sensors being susceptible to remote attacks. A security problem may enable a hacker to incapacitate or fool an ADS resulting in unsafe behaviour. In addition to malicious misuse, the development of environment sensing has to consider functional insufficiencies of the employed sensor technologies. Therefore, both safety and security and their interplay must be addressed in developing the solutions. The first step in gaining public confidence in the technologies involved is to raise user awareness. Therefore there is a need to be transparent and explicit on the evaluation targets and the associated supporting evidence of safe and secure ADS. An assessment of safety and security properties performed by an independent organisation can be an essential step towards establishing trust in ADS solutions, bridging the gap between the marketing portrayal and the actual performance of such systems in operating conditions. This licentiate thesis contributes towards the overall goal of improving the assessment target and the associated supporting evidence of a safe and secure ADS in the automotive domain by (1) assessing requirements for safety, security and their interplay on key enabling technologies, (2) introducing an argument pattern enabling safety, security and interaction overlap to be jointly addressed, (3) proposing a method that enables assessment of security informed safety an independent agency.
216

Using Playable Case Studies to Influence Teen Girls' Self-Efficacy and Interest in Cybersecurity

Winters, Desiree Marie 01 August 2019 (has links)
Various factors dissuade women from the field of cybersecurity. Educational interventions are needed to mitigate the negative effects of stereotypes and low perceived self-efficacy and help girls gain interest in learning about cybersecurity. This thesis focuses on an intervention targeted to increase teenage girls' interest and self-efficacy in cybersecurity: the Cybermatics Playable Case Study. Findings from a mixed-methods study in which a focus group was conducted with 7 middle school girls, interviews were conducted with 2 high school girls, and pre- and post- simulation survey was collected from all 9 participants reveal tensions between enjoyment and frustration in the girls' experience with Cybermatics and their desire for both autonomy in completing tasks and the availability of help when needed. Almost all of the study participants indicated that their experience with the Playable Case Study made them more interested in cybersecurity and feel more confident in their ability to do well in a cybersecurity class, although the quantitative data revealed considerable complexity in the girls' perceptions of these constructs and significant lack of prior knowledge of cybersecurity. Quantitative survey data illustrates correlations between successful completion and enjoyment of the simulation, interest, and self-efficacy. Qualitative data from the focus group and 2 individual interviews shed light on what may be the simulation's greatest benefit: giving exposure to cybersecurity to teen girls in a way that is interesting and provides an accurate portrayal of the work of a security analyst.
217

Investigating The Impact and Privacy Alignment Of IoT Cybersecurity, in Sweden’s Elderly Care : From a user-centric perspective

Sandberg, Johannes January 2022 (has links)
There is a growing need for at-home healthcare and real-time monitoring in elderly care. The increase in elderly and chronically ill patients causes the need forhigh-demand services in healthcare. There is a lack of research regarding the elderly and technology in general. The Internet of Things provides several advantages and functionalities which could be applied to the healthcare domainand provide invaluable services. Healthcare revolves around confidential patient information which raises skepticism about the natural heterogenous devices and network infrastructure IoT relies upon in terms of security and privacy. This research aims to identify the impact of IoT and how privacy is included in the field of cybersecurity in Sweden's elderly care. Researchers, security experts, and IT departments may utilize the research to evaluate the advantages and issues of realizing IoT in elderly care. The research is based upon a systematic literature review, the data were acquired and collected using three different index services. The services were ACM digital library, IEEExplorer, and ScienceDirect. The acquired articles were then analyzed using thematic coding based on the user-centric aligned McCumber Cube framework. This provided relevant themes based on the framework and relevant articles to the research aim. In total, the review provided 47 articles, divided into three themes that connected nine categories. When the thematic coding had been applied, the study could provide feasible answers to the research aim. The study showed that privacy aligns with cybersecurity and personal information, it was barely accounted for in personal communication and behavior.
218

Cybersecurity Awareness Training : Using ContextBased MicroTraining to teach senior citizens about phishing

Lindvall, David January 2022 (has links)
While most Swedish citizens take advantage of the numerous benefits and conveniences today’s digitalized society offers, many senior citizens are digitally excluded. It is considered that a lack of digital technological knowledge is a big contributing factor. The lack of knowledge and experience with digital technology manifests into different types of fear, where fear of falling victim to cybercrime is the most prevalent. Phishing is a common cybercrime, which is still successfully employed by cybercriminals regardless of the various security measures and information available. Senior citizens are especially vulnerable, as phishing can be hard to recognize for less technical people. To combat this, education designed for increasing a user’s cybersecurity awareness is crucial. However, as cybersecurity can be a complex topic, there is a need for simplifying it and delivering related education in a meaningful way. This is where the method ContextBased MicroTraining (CBMT) comes in. For this thesis, a browser add-on called WebSec Coach, which utilizes the CBMT framework, is used as a tool to investigate how CBMT can support Swedish senior citizens in increasing their cybersecurity awareness regarding phishing. This was examined by conducting semi-structured interviews with eight respondents, from the age of 65 and up, that possessed some level of previous computer literacy. The results were then analyzed using thematic analysis, which showed that CBMT implemented in an embedded learning tool, like WebSec Coach, increased the cybersecurity awareness regarding phishing for all respondents. Regardless of the small sample size, the results in combination with previous research point to CBMT being a directly effective method in increasing cybersecurity awareness. Furthermore, the results showed that all respondents perceived WebSec Coach positively and were interested in using it themselves after the interviews. This indicates a potential acceptance amongst senior citizens, provided that the application reaches that target group.
219

Security Aspects of Users' Information Sharing on Social Media

Alharbi, Mohannad Abdulltef 05 1900 (has links)
This study aims to investigate college students' security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (SEM) Lavaan package was used to find out the best fit of the model. A diagonally weighted least squares (DWLS) was used to model the variables as ordinal in this study's analysis as ordinal data made the model fit substantially. The study found that 6 factors: attitude (AB), subjective norm (SN), perceived behavior control (PBC), perceived usefulness (PU), perceived risks (PR), and security awareness (SA) influenced behavior intention (BI). Also, I found that AB was influenced by PR and SA, as well as SN influenced by SA. Self-efficacy (SE) influenced PBC. On the other hand, the study found that controllability (C) did not influence PBC; perhaps, an individual's skills do not interact with social media security settings. Perceived ease of use (PEOU) did not influence BI; perhaps this occurred because of an individual's inability to prevent his or her information from being disclosed in the future, even if they had taken the right precautions. This study contributed to literature on understanding the nature of information sharing among college students on social media. The results may help college security professionals to evaluate or revise the rules and policies regarding cybersecurity and privacy.
220

A Qualitative Comparative Analysis of Data Breaches at Companies with Air-Gap Cloud Security and Multi-Cloud Environments

T Richard Stroupe Jr. (17420145) 20 November 2023 (has links)
<p dir="ltr">The purpose of this qualitative case study was to describe how multi-cloud and cloud-based air gapped system security breaches occurred, how organizations responded, the kinds of data that were breached, and what security measures were implemented after the breach to prevent and repel future attacks. Qualitative research methods and secondary survey data were combined to answer the research questions. Due to the limited information available on successful unauthorized breaches to multi-cloud and cloud-based air gapped systems and corresponding data, the study was focused on the discovery of variables from several trustworthily sources of secondary data, including breach reports, press releases, public interviews, and news articles from the last five years and qualitative survey data. The sample included highly trained cloud professionals with air-gapped cloud experience from Amazon Web Services, Microsoft, Google and Oracle. The study utilized unstructured interviews with open-ended questions and observations to record and document data and analyze results.</p><p dir="ltr">By describing instances of multi-cloud and cloud-based air gapped system breaches in the last five years this study could add to the body of literature related to best practices for securing cloud-based data, preventing data breach on such systems, and for recovering from breach once it has occurred. This study would have significance to companies aiming to protect secure data from cyber attackers. It would also be significant to individuals who have provided their confidential data to companies who utilize such systems. In the primary data, 12 themes emerged. The themes were Air Gap Weaknesses Same as Other Systems, Misconfiguration of Cloud Settings, Insider Threat as Attack Vector, Phishing as Attack Vector, Software as Attack Vector, and Physical Media as Attack Vector, Lack of Reaction to Breaches, Better Authentication to Prevent Breaches, Communications, and Training in Response to Breach, Specific Responses to Specific Problems, Greater Separation of Risk from User End, and Greater Separation of Risk from Service End. For secondary data, AWS had four themes, Microsoft Azure had two, and both Google Cloud and Oracle had three.</p>

Page generated in 0.0457 seconds