Pages
- 1
- 2
- document
-
van den Eeden, Lars (author)The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucial to prevent and minimize the chances of attacks occurring....bachelor thesis 2023
- document
-
Couwenberg, Ruben (author)The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...bachelor thesis 2023
- document
-
Papadopoulos, Panagiotis (author)The Internet of Things (IoT) is a rapidly growing technology that connects millions of devices together. However, as more devices connect, the importance of ensuring security, privacy, and performance becomes paramount. Training performance is affected without proper protocols in place, and devices can get compromised. This research focuses on...bachelor thesis 2023
- document
-
Kramer, Tim (author)The dramatic increase in the number of Internet of Things (IoT) devices has created rapid growth for exploitation of security flaws and vulnerabilities. Particularly for critical infrastructure and real-time systems security threats can be highly damaging. Machine Learning (ML) algorithms have demonstrated the ability to combat the security...bachelor thesis 2023
- document
-
Janssen, Jeroen (author)The Internet of Things (IoT) is producing significant amounts of data. Protecting this data from adversaries is therefore a prominent field of research. This paper conducts a review of the current state-of-the-art in the field of IoT integrated with Blockchain (BC) and Machine Learning (ML). The review focuses on the use of privacy and...bachelor thesis 2023
- document
-
van Hooff, Sam (author)The growing number of software vulnerabilities being disclosed is posing a challenge to many organisations. With limited patching resources and only a fraction of the vulnerabilities posing a real threat, prioritization is key. Current prioritization methods, such as CVSS, are failing and are sometimes no better than random guessing. Exploit...master thesis 2022
- document
-
Khan, Arghem (author)Artificial Intelligence (AI) and Machine learning (ML) applications are being widely used to solve different problems in different sectors. These applications have enabled the human-effort and involvement to be very low. The AI/ML systems<br/>make their own predictions and do not require a great deal of human help. However, over the last few...bachelor thesis 2022
- document
-
Plas, Nicolas (author)Software-Defined Networking (SDN) is a relatively new networking paradigm that proposes to separate the control and the data logic in networks. The control logic is centralized in a controller, which allows for a programmable network. SDN is promising but also intro- duces some critical security vulnerabilities to networks. This work proposes a...bachelor thesis 2022
- document
-
Ivaşcu, Darius (author)The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...bachelor thesis 2022
- document
-
de Los Santos Subirats, Alex (author)Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...bachelor thesis 2022
- document
-
Durand, Dylan (author)Software-Defined Networks are an exciting network paradigm that brings many advantages to its users. However, its architecture also makes it vulnerable to attacks. Distributed Denial of Service attacks are one of those attacks that can<br/>exploit the weaknesses of an SDN. This paper explains the weaknesses that can be exploited and the...bachelor thesis 2022
- document
-
Marbot, Tanguy (author)The spread of AI techniques has lead to its presence in critical situations, with increasing performance that can compromise on its understanding. Users with no prior AI knowledge rely on these techniques such as doctors or recruiters with a need for transparency and comprehensibility of the mechanisms. The advent of Explainable Artificial...bachelor thesis 2022
- document
-
Knap, Mikolaj (author)The ever increasing presence of Machine Learning (ML) algorithms and Artificial Intelligence (AI) agents in safety-critical and sensitive fields over the past few years has spurred massive amounts of research in Explainable Artificial Intelligence (XAI) techniques (models). This new frontier of AI research aims to resolve some of the fundamental...bachelor thesis 2022
- document
-
Oedayrajsingh Varma, Vanisha (author)Many artificial intelligence (AI) systems are built using black-box machine learning (ML) algorithms. The lack of transparency and interpretability reduces their trustworthiness. In recent years, research into explainable AI (XAI) has increased. These systems are designed to tackle common ML issues such as trust, accountability, and transparency...bachelor thesis 2022
- document
-
Lee Kaijen, Kaijen (author)The significant progress of Artificial Intelligence (AI) and Machine Learning (ML) techniques such as Deep Learning (DL) has seen success in their adoption in resolving a variety of problems. However, this success has been accompanied by increasing model complexity resulting in a lack of transparency and trustworthiness. Explainable Artificial...bachelor thesis 2022
- document
-
Florea, Vlad (author)Software Defined Networking (SDN) is a new paradigm that allows for greater reliability and more efficient management compared to traditional networks. However, SDN security is a developing field, and research towards fixing significant security vulnerabilities is still ongoing. One major threat to SDN security are attacks that seek to exploit...bachelor thesis 2022
- document
-
Tolsma, Pieter (author)The Routing Protocol for Low-Power and Lossy Networks (RPL) has gained in popularity since the increased connectivity of everyday items to the Internet. One of the discovered attacks on RPL is the rank attack, which opens up possibilities for attackers to control traffic in the RPL network by spoofing their priority. Many solutions have been...bachelor thesis 2021
- document
-
Duroyon, Marin (author)Routing Protocol for Low Power and Lossy Networks (RPL) is a routing protocol for Internet of Things (IoT) devices with limited resources. As IoT is becoming prevalent, it is important to secure the underlying protocols that compose it such as RPL. This paper sought to avoid an RPL-specific routing attack by modifying the protocol's...bachelor thesis 2021
- document
-
Stenhuis, Ruben (author)While the Routing Protocol for Low Power and Lossy Networks (RPL) is built to support the constraints of low-powered devices, it struggles to meet the standards in security. Generally, low-powered devices are challenged with limited cryptography, tough key management, and interoperability issues. Despite these concerns, security is not only...bachelor thesis 2021
- document
-
Neeleman, Fimme (author)The IPv6 routing protocol for low-power and lossy networks (RPL) is a routing protocol that is standardized for constrained devices. This standard only considers static nodes and consequently underperforms in networks with moving nodes. Several studies exist intending to mend this problem, but analyses of RPL's performance in mobile situations...bachelor thesis 2021
Pages
- 1
- 2