Searched for: subject%3A%22cyber%255C%252Bsecurity%22
(1 - 5 of 5)
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The solar industry in residential areas has been witnessing an astonishing growth worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside smart inverters (SIs). These IoT-enabled devices aim to introduce a certain degree of intelligence to conventional inverters by integrating various grid support...
journal article 2023
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The concept of the internet of energy (IoE) emerged as an innovative paradigm to encompass all the complex and intertwined notions relevant to the transition of current smart grids towards more decarbonization, digitalization and decentralization. With a focus on the two last aspects, the amount of intelligent devices being connected in a...
journal article 2022
document
Stefanov, Radoslav (author)
Blockchain networks have gained recent popularity among organisations that want to make use of the security aspects that blockchain provides. Fabric is one of the most used distributed network technologies, most commonly applied in scenarios that require confidential data to be stored securely and privately. Use case examples are finance,...
bachelor thesis 2021
document
Yüksel, Akif (author)
Kyber is a Decentralized Finance (DeFi) system which runs on the Ethereum blockchain. DeFi aims to remove centralized intermediaries such as Market Makers. An Automated Market Maker (AMM), implemented in a smart contract, is a decentralized version of these. Kyber's Dynamic Market Maker (DMM) is a next-generation AMM which solves two issues:...
bachelor thesis 2021
document
Bubberman, Wolf (author)
The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify...
bachelor thesis 2020
Searched for: subject%3A%22cyber%255C%252Bsecurity%22
(1 - 5 of 5)