Impact of down scaling the two most important resources of a network element controller on microservices based software
This thesis investigates microservices software performance under CPU frequency and core count downscaling. It aims to understand behavior on weaker computers, predict performance...
LogInsight: A Scalable, Multiformat Log Analysis Framework for System Anomalies Detection
Modern IT systems and networks are complex and greatly diverse. To maintain their operation and resilience against malicious attacks, security teams invoke to the log analysis. A log is a notebook that summari...
Enhancing Cybersecurity: LLM-based Intrusion Detection System.
The threat of cyberattacks is challenging modern digital infrastructure. While traditional intrusion detection systems are already effective, they have certain limitations, for example, in detecting new attack patterns. With ...
Dynamic Anomaly Detection for Evolving Cyber Threats Using Adaptive LSTM Networks
Cybersecurity systems must adapt to constantly evolving threats, where traditional static models, such as LSTM, struggle with concept drift and unseen attack vectors. This thesis proposes an adaptive anomaly...
Towards an Evaluation Framework for Co-Simulation Middlewares
The integration of complex, multi-domain models through co-simulation frameworks is essential for the analysis of modern cyber-physical systems. However, the landscape of available tools presents a critical challenge: prominent framework...