Searched for: contributor%3A%22Smaragdakis%2C+G.+%28mentor%29%22
(1 - 18 of 18)
document
Mohammed, Murtuza (author)
master thesis 2024
document
Koursiounis, Giorgos (author)
<div>Security researchers and industry firms employ Internet-wide scanning for information collection, vulnerability detection and security evaluation, while cybercriminals make use of it to find and attack unsecured devices. Internet scanning plays a considerable role in threat detection &amp; response, and cyber threat intelligence. We adopt a...
master thesis 2024
document
Molakala Narasimhalu, Vyshnavi (author)
The inception of onion routing in the mid-1990s, evolving into Tor (The Onion Routing) and other anonymous networks, marked a pivotal moment in the quest for internet privacy. However, the emergence of the dark web, facilitated by these networks, has also increased cybercrime activities, necessitating a critical examination of its implications...
master thesis 2024
document
Khattat, Mostafa (author)
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more devices to recover the key. Additionally, threshold signatures can...
master thesis 2024
document
Simonov, Alex (author)
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influence on different aspects of our lives. It is, however, shown that...
master thesis 2024
document
Ho, Björn (author)
A searchable symmetric encryption (SSE) scheme allows a user to securely perform a keyword search on an encrypted database. This search capability is useful but comes with the price of unintentional information leakage. An attacker abuses leakage to steal confidential information by launching SSE attacks. In this work, our goal is to design a...
master thesis 2023
document
Samardžić, Mariana (author)
The Machine Learning (ML) technology has taken the world by storm since it equipped the machines with previously unimaginable decision-making capabilities. However, building powerful ML models is not an easy task, but the demand for their utilization in different industries and areas of expertise is high. This was recognized by entities that...
master thesis 2023
document
Kazemi Koohbanani, Paolo Arash (author)
Distributed Denial of Service (DDoS) leverages the power of multiple servers to disrupt the operations of a victim service. Due to the financial risks posed by downtimes on critical online infrastructure, DDoS is among the top threats in the cybersecurity landscape.<br/><br/>In this paper, we analyze the characteristics of previously launched...
master thesis 2023
document
van der Peet, Louise (author)
Large amounts of trackers and other data collection forms increasingly invade users’ privacy on the web. The General Data Protection Regulation (GDPR) aims to address these issues in Europe, but many violations are still made, and overall transparency is low. However, GDPR auditing frameworks and mechanisms are still missing. Weaddress this...
master thesis 2023
document
van Groeningen, Boris (author)
CNAME (Canonical Name) cloaking has emerged as a deceptive technique employed by website operators to obfuscate the true origin of their content. This master thesis aims to comprehensively examine the utilization and prevalence of CNAME cloaking across the web.<br/><br/>To achieve this, a custom program was developed to crawl websites and gather...
master thesis 2023
document
Slotboom, Riley (author)
Simulating non-Euclidean geometry in virtual reality is of interest to a wide variety of fields of research. However it is still quite a challenge. Various methods are already known, but they vary greatly in performance and applicability. This paper compares some methods of rendering a non-Euclidean space. We focus on the order-5 square tiling...
bachelor thesis 2023
document
Mladenov, Martin (author)
Supervisory Control and Data Acquisition (SCADA) systems are sometimes exposed on the public Internet. It is possible to quickly and efficiently identify such exposed services. They are commonly part of critical infrastructure, so they need to be protected against cyber attacks. In the past, researchers have scanned the Internet to detect such...
bachelor thesis 2023
document
Taneva, Aleksandra (author)
Nowadays, the online industry contributes to a multi-billion dollar business, facilitates most of the population's everyday activities, and processes vast amounts of data, including personal data. Current work aims to explore the inconsistency or consistency of the content obtained by the websites to generate cookies based on various data that...
master thesis 2023
document
van der Boon, Mike (author)
Distributed Energy Resources (DER), like solar panels, are projected to take over power generation responsibilities. This will happen during the transition of the current power grid to the Smart Grid. Due to the importance of this power to society, it is crucial that the grid stays stable.<br/><br/>DER devices are similar to IoT devices in scale...
master thesis 2023
document
Ilbaş, Hakan (author)
The amount of data individuals create keeps increasing every year to the point that the data cannot be stored on a single device anymore. Cloud storage provides a solution for this problem, but not everybody wants the cloud storage service providers to peek at their data and they thus encrypt their data before storing it on the service provider...
master thesis 2022
document
Kramer, Stijn (author)
In the modern day there exist many different ways that someone can steal your authentication cookies. Each of those ways needs to be mitigated through many different solutions. Would it not be better if instead of preventing theft, we could prevent the use of stolen cookies? This thesis therefore researches both existing and novel solutions that...
master thesis 2022
document
Güdek, Ahmet (author)
Since the introduction of networking protocols for Low-power and Lossy Networks (LLN), many implementations have been created in the form of (real-time) Operating Systems (OS), simplifying their usage and making the technology more widely available. The low cost and low complexity of LLNs allow for large-scaled wireless sensor deployments,...
master thesis 2022
document
Nguyen, Thanh-Dat (author)
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be audited and monitored by any party. This allows to detect mis­issued certificates quickly and catch the misbehaving certificate authorities. CT makes the certificate ecosystem more transparent and less reliant on trust that trusted certificate...
master thesis 2022
Searched for: contributor%3A%22Smaragdakis%2C+G.+%28mentor%29%22
(1 - 18 of 18)