To see the other types of publications on this topic, follow the link: Cyber Threat Analysis.

Dissertations / Theses on the topic 'Cyber Threat Analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Cyber Threat Analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chah, Niel. "North Korea : cyber threat perception and metadata analysis." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50082.

Full text
Abstract:
Since the turn of the century, the increasing relevance of the Internet and non-traditional security concerns has been visible in the East Asian context. On the Korean peninsula, there have been starkly different approaches to cyberspace. South Korea, a developed economy and liberal democracy has made significant strides in adopting the Internet while its northern counterpart still remains largely unconnected. In such a context, this paper uses metadata and big data sources to delve into the American threat perception of North Korean cyberspace. Recent trends indicate that the American governm
APA, Harvard, Vancouver, ISO, and other styles
2

Marchenko, Maksym. "Understanding and analysis of cyber threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50999.

Full text
Abstract:
1.Apple Inc. Risk Assessment and Threat Modeling. Retrieved on 07/08/2014 from https://developer.apple.com/library/ios/documentation/Security/Conceptual/Security_Overview/ ThreatModeling/ThreatModeling.html 2.Cyber Squared Inc. Cyber Threat Analysis, not just for the Military. Retrieved on 07/08/2014 from http://www.cybersquared.com/2012/02/cyber-threat-analysis-not-just-for-themilitary/ 3.Goel, S. & Chen, V. (2005). Information Security Risk Analysis – A Matrix-based Approach. Retrieved on 07/08/2014 from http://www.albany.edu/~GOEL/publications/goelchen2005.pdf 4.Hughe, J. & Cybenko, G.
APA, Harvard, Vancouver, ISO, and other styles
3

Javaid, Ahmad Yazdan. "Cyber Security Threat Analysis and Attack Simulation for Unmanned Aerial Vehicle Network." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1438816219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morgan, Deanne. "Assessing Terrorist Cyber Threats: Engineering a Functional Construct." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799463/.

Full text
Abstract:
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose. One step in facilitating the examination and assessment of the level of cyber threat posed by terrorist organizations and individuals is development of an assessment tool or methodology. This tool would guide intelligence collection efforts and would support and facilitate comparative assessment of
APA, Harvard, Vancouver, ISO, and other styles
5

Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.

Full text
Abstract:
Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in 2012 recognised the cyber threat as Tier-1 threat since about 50 government departments have been either subjected to an attack or a direct threat from an attack. The cyberspace has become the platform of choice for businesses, schools, universities, colleges, hospitals and other sectors for business activities. One of the major problems identified by the Department of Homeland Security is the lack of clear security metrics. The recent cyber s
APA, Harvard, Vancouver, ISO, and other styles
6

Gripenstedt, Daniel, and Joakim Öberg. "A security analysis in a life science environment : a case study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299357.

Full text
Abstract:
The cyber-threat against life-science is much larger today than just a couple of years back. Companies within the field have valuable information from example R& Din pharmaceuticals, biotech, personal data of vulnerable patients or medical devices and that is something attackers are very much aware of. Lab equipment have generally been disconnected from the internet to protect their data even more but the benefits a company would gain in diagnostics and support could outweigh it. In this paper a fictional environment with lab instruments, control units and databases is set up based on a re
APA, Harvard, Vancouver, ISO, and other styles
7

Duisembiyeva, Akzharkyn. "Automated security analysis of a SCADA system." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286336.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. Therefore, the security aspect of such a system has a significant role. The early SCADA systems were designed with the operation as the primary concern rather than security since they were a monolithic networked system without external access. However, the systems e
APA, Harvard, Vancouver, ISO, and other styles
8

Erendor, Mehmet Emin. "An analysis of threat perceptions : combating cyber terrorism : the policies of NATO and Turkey, evaluated using game theory in the context of international law." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/404985/.

Full text
Abstract:
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics and security. However, despite this series of cyber-attacks, NATO did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, whilst there has been no common definition of ‘cyber terrorism’ by the internati
APA, Harvard, Vancouver, ISO, and other styles
9

Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.

Full text
Abstract:
Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with the storage of sensitive information being a rule rather than an exception. This poses a need of a time- and cost efficient way to assess the cyber security of an enterprise. The threat modeling language enterpriseLang constitute just that, where a general enterprise system assumption allows for re-usage on several enterprise systems. The language is created with Meta Attack Language and is based on the knowledgeable attack- and mitigation steps of MITRE ATT&CK Enterprise Matrix. Since all pos
APA, Harvard, Vancouver, ISO, and other styles
10

Mészáros, Jan. "Rámec pro řízení bezpečnostních rizik on-line služeb." Doctoral thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-203732.

Full text
Abstract:
This dissertation thesis is dedicated to on-line services security management from service provider's and service consumer's viewpoints. The main goal is to propose a framework for on-line services security risk management, to develop a supporting software tool prototype and to validate them through a case study performed in a real-world environment. The key components of the proposed framework are a threat model and a risk model. These models are designed to fit specific features of on-line services and the surrounding environment. A risk management process is an integral part of the framewor
APA, Harvard, Vancouver, ISO, and other styles
11

Sun, Tithnara Nicolas. "Modélisation et analyse formelle de modèles système pour les menaces persistantes avancées." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2022. http://www.theses.fr/2022ENTA0004.

Full text
Abstract:
La criticité croissante des systèmes industriels les expose davantage aux menaces du monde cyber. En particulier les menaces persistantes avancées ou Advanced Persistent Threats (APT) sont des attaquants sophistiqués dotés de ressources conséquentes et ciblant spécifiquement les systèmes critiques. Les méthodologies de cyber-défense actuelles permettent de protéger les systèmes contre les cyber-menaces classiques mais elles peinent à contrer efficacement les APT. En effet, les APT usent de stratégies complexes et de tactiques de dissimulation qui les rendent difficile à contrecarrer. Pour répo
APA, Harvard, Vancouver, ISO, and other styles
12

Quaglia, Flavia <1991&gt. "Information and Communication Technology (ICT)and cyber threats: the main fields of analysis." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/7945.

Full text
Abstract:
The goal of my thesis is to demonstrate the importance of Information and Communication Technology (ICT) in the Twenty-First Century as, if on one hand it is at the basis of the functioning of societies, on the other hand it represents a source of threat, in particular cyber threats, to the security of societies, it changes the nature of conflicts which are fought in a new domain of war called cyberspace and consequently the strategies of response given by states in order to provide security to their citizens and territories have to change too, focusing on international cooperation and public-
APA, Harvard, Vancouver, ISO, and other styles
13

Li, Weifeng, and Weifeng Li. "Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625640.

Full text
Abstract:
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and more. However, the cybersecurity sector is behind other sectors in benefiting from the business intelligence offered by social media analytics. Given the role of hacker communities in cybercrimes and the prevalence of hacker communities, there is an urg
APA, Harvard, Vancouver, ISO, and other styles
14

Bača, Jonatán. "Informační a kybernetické hrozby v roce 2019." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417712.

Full text
Abstract:
Diploma thesis focuses on information and cyber threats in 2019. It comprises theoretical basis for better understanding of the issue. Afterward the thesis describes the analysis of the current situation which combined several analyses primarily aimed on Czech companies. In the last part draft measures is created which contain predictions and preventive actions and recommendations for companies.
APA, Harvard, Vancouver, ISO, and other styles
15

Rukavina, Ivan. "Cyber-physics intrinsic modelling for smart systems." Thesis, Compiègne, 2021. http://bibliotheque.utc.fr/EXPLOITATION/doc/IFD/2021COMP2581.

Full text
Abstract:
Dans le cadre de cette thèse, une approche de calcul de couplage multi-échelle et multi-physique en 2D et en 3D est présentée. La modélisation multi-échelle d’une structure consiste de l’échelle macro qui représente la réponse homogénéisée de la structure entière, tandis que l’échelle micro peut capturer les détails du comportement à la petite échelle du matériau, où des mécanismes inélastiques, tels que la plasticité ou l’endommagement, peuvent être pris en compte. L’intérieur de chaque macro-élément est rempli par le maillage à l’échelle micro qui s’y adapte entièrement. Les deux échelles so
APA, Harvard, Vancouver, ISO, and other styles
16

Lin, Chih-Hung, and 林志鴻. "Efficient Hypervisor-based Cyber Threat Monitoring and Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/gdd7as.

Full text
Abstract:
博士<br>國立臺灣科技大學<br>資訊工程系<br>106<br>Based on the hypervisor security monitor, this research proposed a cyber activity monitoring methods, including virtual intrusion detection system, a sandboxing-based method, notably using virtual time control mechanics and information measurement in the hypervisor layer. By translating and correlating the required information from OSs' kernal map in hypervisor layer, the OS and network services in each VM can be identified by vIDS. Consequently, the NIDS's detection rules can be tuned dynamically in the current cloud virtualization environment. Compared with
APA, Harvard, Vancouver, ISO, and other styles
17

Ghafir, Ibrahim, M. Hammoudeh, V. Prenosil, et al. "Detection of advanced persistent threat using machine-learning correlation analysis." 2018. http://hdl.handle.net/10454/17614.

Full text
Abstract:
Yes<br>As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the targeted system, which has the potential to cause significant damage and substantial financial loss. The accurate detection and prediction of APT is an ongoing challenge. This work proposes a novel machine learning-based system entitled MLAPT, which can accurately and rapidly detect and predict APT attacks in a systematic way. The MLAPT run
APA, Harvard, Vancouver, ISO, and other styles
18

Hsien-DeHuang and 黃獻德. "Deep learning based anomaly analysis in cyber threats." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m2awfx.

Full text
Abstract:
博士<br>國立成功大學<br>資訊工程學系<br>107<br>In the world of the Internet, in recent years, there have been several phenomena worthy of attention. One is the use of smart phones and Android applications (apps). Smart phones are an indispensable part of people's daily lives, and Android has become the most popular smart phone operating system because of its openness. However, its openness makes malware very easy to spread and infect Android devices. Pop-ups for Android apps are a powerful tool for maintaining user and app relationships, but we can't ignore the security of Android and the nuisance caused by
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!