Pages
- 1
- 2
- document
-
Couwenberg, Ruben (author)The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...bachelor thesis 2023
- document
-
Papadopoulos, Panagiotis (author)The Internet of Things (IoT) is a rapidly growing technology that connects millions of devices together. However, as more devices connect, the importance of ensuring security, privacy, and performance becomes paramount. Training performance is affected without proper protocols in place, and devices can get compromised. This research focuses on...bachelor thesis 2023
- document
-
Kramer, Tim (author)The dramatic increase in the number of Internet of Things (IoT) devices has created rapid growth for exploitation of security flaws and vulnerabilities. Particularly for critical infrastructure and real-time systems security threats can be highly damaging. Machine Learning (ML) algorithms have demonstrated the ability to combat the security...bachelor thesis 2023
- document
-
Bezema, Menno (author)Attacks using drones are increasing, war zones see more and more use of drones and civilian areas are threatened by cheap commercial drones. In order to prevent drone attacks, they have to be detected; identifiedand neutralized. Faster identification results in more time to respond, making identification vital. This thesisuses radar to identify...master thesis 2022
- document
-
van der Poel, Laurens (author)This thesis is a research into developing a methodology and implementation of automated gray-box Broken Access Control Scanning (BACS) in web applications. Broken access controls take first place in the OWASP Top Ten Web Application Security Risks 2021. The need for this research comes from the observation that testing for broken access controls...master thesis 2022
- document
-
van Hooff, Sam (author)The growing number of software vulnerabilities being disclosed is posing a challenge to many organisations. With limited patching resources and only a fraction of the vulnerabilities posing a real threat, prioritization is key. Current prioritization methods, such as CVSS, are failing and are sometimes no better than random guessing. Exploit...master thesis 2022
- document
-
Khan, Arghem (author)Artificial Intelligence (AI) and Machine learning (ML) applications are being widely used to solve different problems in different sectors. These applications have enabled the human-effort and involvement to be very low. The AI/ML systems<br/>make their own predictions and do not require a great deal of human help. However, over the last few...bachelor thesis 2022
- document
-
Plas, Nicolas (author)Software-Defined Networking (SDN) is a relatively new networking paradigm that proposes to separate the control and the data logic in networks. The control logic is centralized in a controller, which allows for a programmable network. SDN is promising but also intro- duces some critical security vulnerabilities to networks. This work proposes a...bachelor thesis 2022
- document
-
Ivaşcu, Darius (author)The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...bachelor thesis 2022
- document
-
de Los Santos Subirats, Alex (author)Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...bachelor thesis 2022
- document
-
Durand, Dylan (author)Software-Defined Networks are an exciting network paradigm that brings many advantages to its users. However, its architecture also makes it vulnerable to attacks. Distributed Denial of Service attacks are one of those attacks that can<br/>exploit the weaknesses of an SDN. This paper explains the weaknesses that can be exploited and the...bachelor thesis 2022
- document
-
Marbot, Tanguy (author)The spread of AI techniques has lead to its presence in critical situations, with increasing performance that can compromise on its understanding. Users with no prior AI knowledge rely on these techniques such as doctors or recruiters with a need for transparency and comprehensibility of the mechanisms. The advent of Explainable Artificial...bachelor thesis 2022
- document
-
Knap, Mikolaj (author)The ever increasing presence of Machine Learning (ML) algorithms and Artificial Intelligence (AI) agents in safety-critical and sensitive fields over the past few years has spurred massive amounts of research in Explainable Artificial Intelligence (XAI) techniques (models). This new frontier of AI research aims to resolve some of the fundamental...bachelor thesis 2022
- document
-
Oedayrajsingh Varma, Vanisha (author)Many artificial intelligence (AI) systems are built using black-box machine learning (ML) algorithms. The lack of transparency and interpretability reduces their trustworthiness. In recent years, research into explainable AI (XAI) has increased. These systems are designed to tackle common ML issues such as trust, accountability, and transparency...bachelor thesis 2022
- document
-
Lee Kaijen, Kaijen (author)The significant progress of Artificial Intelligence (AI) and Machine Learning (ML) techniques such as Deep Learning (DL) has seen success in their adoption in resolving a variety of problems. However, this success has been accompanied by increasing model complexity resulting in a lack of transparency and trustworthiness. Explainable Artificial...bachelor thesis 2022
- document
-
Florea, Vlad (author)Software Defined Networking (SDN) is a new paradigm that allows for greater reliability and more efficient management compared to traditional networks. However, SDN security is a developing field, and research towards fixing significant security vulnerabilities is still ongoing. One major threat to SDN security are attacks that seek to exploit...bachelor thesis 2022
- document
-
Subramanian, Vasanth (author)We live in a world where much of our interactions with the environment around us depend on us being physically close to them. For instance, we have proximitybased tokens (e.g., keys and smartcards) for access systems installed at various places such as in cars, at contactless payment terminals, and in electronic passports. Moreover, such...master thesis 2021
- document
-
Khandhar, Shubham (author)With the ever-increasing threat of malware attacks, building an effective malware classifier to detect malware promptly is of utmost importance. Malware is constantly growing and evolving with the use of sophisticated obfuscation techniques. Thus, classifying malware accurately becomes a tough challenge. Malware visualization approaches and deep...master thesis 2021
- document
-
von Hünerbein, Anton (author)The world is getting more and more censored, and the currently available solutions work but with high latency costs. We proposed Ethix, a low latency general-purpose architecture with differential privacy, low network overhead and high theoretical censorship evasion. The Ethix system is a hybrid VPN architecture that uses both centrally...master thesis 2021
- document
-
Ravindranath, Arpita (author)Voice messages are an increasingly well-known method of communication, accounting for more than 200 million messages a day. Sending audio messages requires a user to invest lesser effort compared to texting while enhancing the meaning of the message by adding an emotional context (e.g., irony). Unfortunately, we suspect that voice messages might...master thesis 2021
Pages
- 1
- 2