Here I have a collection of papers, regarding computer science, which I wrote during my study at the university of Innsbruck.
Contact me if you want to get more information about one of my papers.
Cyber threat intelligence is used more and more to help protecting companies or organizations against cyber-attacks. Also, more and more platforms are offering to share cyber threat information. One very important part which comes along with using and sharing cyber threat knowledge, is about how informative and useful these information are.
With other words, it is important to have a high data quality. To get a relation what means data quality in a special domain like cyber threats, this paper tries to find metrics which can be applied on threat information.
Therefore some, for this domain specific, measurements are analyzed and new ones are developed.
Over the last years cyber threat information (sharing) got more and more interesting for organisation and companies. As a reaction, some security software vendors developed platforms for exchanging the knowledge about cyber threats. These platforms often offer different services and different information formats. Also, in the literature various descriptions and approaches can be found. To get a more common understanding of cyber threat intelligence and what is important about it, this paper analyses the state of the art. An overview is important to get closer to a general definition. To formulate this definition, the analysed literature was minimized to their main statements. In the end, the topics which were often discussed in various papers were taken for the definition. This unified definition should make cyber threat intelligence (sharing) easier and more efficient.
The amount of malicious applications like Viruses, Trojans, Backdoors, Rootkits, Ransomware is growing daily. Therefore, each user should protect his personal computer or mobile device by using an antivirus solution, which should be certified by an independent testing lab.
To evaluate antivirus solutions properly, many different testing procedures have to be applied to check if each individual component is working properly. Plenty of these tests are complex, challenging, time consuming and resource intensive. Not to mention that human errors cause inaccurate test results, automation is one of the key points which could not always be realized.
To improve such non-automated tests like the Malware Removal Test (section 2.1), a workflow system was implemented. The system guides the testers through the workflow to minimize human mistakes.
Another goal was to automate any steps of the Malware Removal Test where it was practicable. Therefore, a client tool was implemented that is executed on the testing machine and can be monitored via the workflow system. The automated steps of the workflow are executed by the client tool and the results are returned back to the system.
Therefore, the main contribution of this bachelor thesis is a tool for improving complex testing methodologies through using workflows and automation.
This paper offers a short introduction into process configuration and a collection of useful tools to handle process models. This collection of tools is known under the name Synergia. The reason why process models can have a lot of different variants is, because they are often reused in different application environments. Therefore it is important to have good and stable tools to work with. The idea behind process configuration and the different techniques, which are used by the tools fill the first part of the paper. This part is followed by the description of Synergia and the included tools.