Browsing by Subject "cyber attacks"
Now showing items 1-3 of 3
-
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices
(North Dakota State University, 2019)There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. ... -
Increasing the Predictive Potential of Machine Learning Models for Enhancing Cybersecurity
(North Dakota State University, 2021)Networks have an increasing influence on our modern life, making Cybersecurity an important field of research. Cybersecurity techniques mainly focus on antivirus software, firewalls and intrusion detection systems (IDSs), ... -
Zero-Trust Architecture and Its Cost-Effectiveness on Network Security
(North Dakota State University, 2022)Zero-Trust Architecture (ZTA) is a ‘Never Trust, Always Verify’ concept to improve cybersecurity by eliminating trust and validating network requests continuously. ZTA replaces Virtual Private Networks (VPNs) and provides ...