Searched for: subject%3A%22XOR%255C%2Bsequence%255C%2Bnumber%22
(1 - 1 of 1)
Griffioen, H.J. (author)
The internet is rapidly growing, and with it grows the number of malicious actors. For many attacks, the attacker first scans the internet to detect vulnerable devices. In order to evade detection, the attacker distributes the scanning over a large number of machines. Because attackers are distributing this scanning and there is no way to find...
master thesis 2018