Searched for: +
(1 - 20 of 44)

Pages

document
Out, Annabelle (author)
This project explores the prospects for interior design in a dual purpose train that can run both day and night for improved utilization and comfort.<br/><br/>Contemporary trains are categorized as either exclusively for daytime or nighttime use. Their interiors limit them to specific temporal contexts. For instance, in daytime trains,...
master thesis 2024
document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
Pîrcălăboiu, Laura (author)
Docker has been one of the most widely used DevOps tools in the last decade, enabling fast development of personalized services. Indeed, the common practice is to reuse already available containers and customize them based on the developer's needs. DockerHub is the leading platform for uploading and downloading Docker containers. Unfortunately,...
master thesis 2023
document
Glaser, Michael (author)
Currently, the Dutch National Police are looking to optimize resource allocation and decision-making through the measurement of the concept: “safety.” However, the measurement of safety does not have a universally defined method in the branch of policing and security. Qualitative data collection methods are being increasingly implemented in...
master thesis 2023
document
van den Eeden, Lars (author)
The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucial to prevent and minimize the chances of attacks occurring....
bachelor thesis 2023
document
Kramer, Tim (author)
The dramatic increase in the number of Internet of Things (IoT) devices has created rapid growth for exploitation of security flaws and vulnerabilities. Particularly for critical infrastructure and real-time systems security threats can be highly damaging. Machine Learning (ML) algorithms have demonstrated the ability to combat the security...
bachelor thesis 2023
document
Galvan Hernández, Jan Andres (author)
The recent advances in the semiconductor industry have given rise to the development of highly scalable, wireless and battery-free neural-implant interfaces that enable brain monitoring and brain stimulation with high spatial and temporal resolution. Such implants are referred to as Free-Floating Neural Implants (FFNI), as the small size and...
master thesis 2022
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
document
Ivaşcu, Darius (author)
The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...
bachelor thesis 2022
document
Grishkov, Ilya (author)
This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and...
bachelor thesis 2022
document
Park, Chaiwon (author)
A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....
bachelor thesis 2022
document
Pletinckx, Stijn (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is difficult to avoid these misconfigurations, which is why they are...
master thesis 2021
document
Slager, Cheyenne (author)
GoQuorum is an enterprise blockchain platform that supports smart contracts and allows for private transactions. Smart contracts enable automated payment while eliminating the need for third-party involvement. Previous attacks on smart contracts have already shown that existing vulnerabilities can lead to great financial losses. Yet, a study...
bachelor thesis 2021
document
Hahn, Georg (author)
Medical Body Area Networks (MBANs) are a cluster of possibly heterogeneous devices, communicating with each other in, on or around the human body. Through these devices, medical data is collected, processed in some way and transferred outside of the network. The IEEE 802.15.6 standard aims to govern communications between such devices. It...
master thesis 2021
document
Arora, Shruti (author)
Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...
bachelor thesis 2021
document
de Klerk, Leon (author)
The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...
bachelor thesis 2021
document
Ştefan, Andrei (author)
Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including...
bachelor thesis 2021
document
Filip, Eduard (author)
Federated Learning starts to give a new perspective regarding the applicability of machine learning in real-life scenarios. Its main goal is to train the model while keeping the participants' data in their devices, thus guaranteeing the privacy of their data. One of the main architectures is the Horizontal Federated Learning, which is the most...
bachelor thesis 2021
document
Dikmen, Cemal (author)
With the growing scale of the IoT, many industries enjoy the benefit of automation. The IoT consists of an interconnected network of devices that sense their surroundings and share data among other IoT devices. However, this data can be sensitive and private in nature, making security within the ever-growing IoT network a high priority. Because...
bachelor thesis 2021
Searched for: +
(1 - 20 of 44)

Pages