Searched for: contributor%3A%22Conti%2C+M.+%28mentor%29%22
(1 - 20 of 33)

Pages

document
Castagnaro, Alberto (author)
Web Vulnerability Assessment and Penetration Testing (Web VAPT) is an important cybersecurity practice that thoroughly examines web applications to uncover possible vulnerabilities. These vulnerabilities represent potential security gaps that could severely compromise the web applications' integrity and functionality if exploited by malicious...
master thesis 2024
document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Gnanavarothayan, Kabilan (author)
The use of Internet of Things (IoT) devices has experienced an increase since its inception and is expected to continue to do so. However, this growth has also attracted individuals with malicious intentions. Botnet attacks on IoT devices have become more potent each year, exploiting new vulnerabilities and attacking more devices. Therefore, it...
master thesis 2023
document
Pîrcălăboiu, Laura (author)
Docker has been one of the most widely used DevOps tools in the last decade, enabling fast development of personalized services. Indeed, the common practice is to reuse already available containers and customize them based on the developer's needs. DockerHub is the leading platform for uploading and downloading Docker containers. Unfortunately,...
master thesis 2023
document
Papadopoulos, Panagiotis (author)
The Internet of Things (IoT) is a rapidly growing technology that connects millions of devices together. However, as more devices connect, the importance of ensuring security, privacy, and performance becomes paramount. Training performance is affected without proper protocols in place, and devices can get compromised. This research focuses on...
bachelor thesis 2023
document
Kramer, Tim (author)
The dramatic increase in the number of Internet of Things (IoT) devices has created rapid growth for exploitation of security flaws and vulnerabilities. Particularly for critical infrastructure and real-time systems security threats can be highly damaging. Machine Learning (ML) algorithms have demonstrated the ability to combat the security...
bachelor thesis 2023
document
Couwenberg, Ruben (author)
The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...
bachelor thesis 2023
document
Bezema, Menno (author)
Attacks using drones are increasing, war zones see more and more use of drones and civilian areas are threatened by cheap commercial drones. In order to prevent drone attacks, they have to be detected; identifiedand neutralized. Faster identification results in more time to respond, making identification vital. This thesisuses radar to identify...
master thesis 2022
document
van der Poel, Laurens (author)
This thesis is a research into developing a methodology and implementation of automated gray-box Broken Access Control Scanning (BACS) in web applications. Broken access controls take first place in the OWASP Top Ten Web Application Security Risks 2021. The need for this research comes from the observation that testing for broken access controls...
master thesis 2022
document
van Hooff, Sam (author)
The growing number of software vulnerabilities being disclosed is posing a challenge to many organisations. With limited patching resources and only a fraction of the vulnerabilities posing a real threat, prioritization is key. Current prioritization methods, such as CVSS, are failing and are sometimes no better than random guessing. Exploit...
master thesis 2022
document
Khan, Arghem (author)
Artificial Intelligence (AI) and Machine learning (ML) applications are being widely used to solve different problems in different sectors. These applications have enabled the human-effort and involvement to be very low. The AI/ML systems<br/>make their own predictions and do not require a great deal of human help. However, over the last few...
bachelor thesis 2022
document
Durand, Dylan (author)
Software-Defined Networks are an exciting network paradigm that brings many advantages to its users. However, its architecture also makes it vulnerable to attacks. Distributed Denial of Service attacks are one of those attacks that can<br/>exploit the weaknesses of an SDN. This paper explains the weaknesses that can be exploited and the...
bachelor thesis 2022
document
Ivaşcu, Darius (author)
The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...
bachelor thesis 2022
document
de Los Santos Subirats, Alex (author)
Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...
bachelor thesis 2022
document
Plas, Nicolas (author)
Software-Defined Networking (SDN) is a relatively new networking paradigm that proposes to separate the control and the data logic in networks. The control logic is centralized in a controller, which allows for a programmable network. SDN is promising but also intro- duces some critical security vulnerabilities to networks. This work proposes a...
bachelor thesis 2022
document
Lee Kaijen, Kaijen (author)
The significant progress of Artificial Intelligence (AI) and Machine Learning (ML) techniques such as Deep Learning (DL) has seen success in their adoption in resolving a variety of problems. However, this success has been accompanied by increasing model complexity resulting in a lack of transparency and trustworthiness. Explainable Artificial...
bachelor thesis 2022
document
Oedayrajsingh Varma, Vanisha (author)
Many artificial intelligence (AI) systems are built using black-box machine learning (ML) algorithms. The lack of transparency and interpretability reduces their trustworthiness. In recent years, research into explainable AI (XAI) has increased. These systems are designed to tackle common ML issues such as trust, accountability, and transparency...
bachelor thesis 2022
document
Knap, Mikolaj (author)
The ever increasing presence of Machine Learning (ML) algorithms and Artificial Intelligence (AI) agents in safety-critical and sensitive fields over the past few years has spurred massive amounts of research in Explainable Artificial Intelligence (XAI) techniques (models). This new frontier of AI research aims to resolve some of the fundamental...
bachelor thesis 2022
document
Marbot, Tanguy (author)
The spread of AI techniques has lead to its presence in critical situations, with increasing performance that can compromise on its understanding. Users with no prior AI knowledge rely on these techniques such as doctors or recruiters with a need for transparency and comprehensibility of the mechanisms. The advent of Explainable Artificial...
bachelor thesis 2022
document
Florea, Vlad (author)
Software Defined Networking (SDN) is a new paradigm that allows for greater reliability and more efficient management compared to traditional networks. However, SDN security is a developing field, and research towards fixing significant security vulnerabilities is still ongoing. One major threat to SDN security are attacks that seek to exploit...
bachelor thesis 2022
Searched for: contributor%3A%22Conti%2C+M.+%28mentor%29%22
(1 - 20 of 33)

Pages