Searched for: subject%3A%22security%22
(1 - 20 of 559)

Pages

document
Xu, J. (author)
Deep Neural Networks (DNNs) have found extensive applications across diverse fields, such as image classification, speech recognition, and natural language processing. However, their susceptibility to various adversarial attacks, notably the backdoor attack, has repeatedly been demonstrated in recent years. <br/>The backdoor attack aims to...
doctoral thesis 2025
document
Castagnaro, Alberto (author)
Web Vulnerability Assessment and Penetration Testing (Web VAPT) is an important cybersecurity practice that thoroughly examines web applications to uncover possible vulnerabilities. These vulnerabilities represent potential security gaps that could severely compromise the web applications' integrity and functionality if exploited by malicious...
master thesis 2024
document
Li, H. (author)
Electronic devices have permeated into all aspects of our lives, from basic smart cards to sophisticated hybrid automobile systems. These devices comprise a range of products like sensors, wearable gadgets, mobile phones, personal computers, and others, playing vital roles in many applications and enabling the Internet of Things (IoT). However,...
doctoral thesis 2024
document
Pigmans, Max (author)
Most of the adversarial attacks suitable for attacking decision tree ensembles work by doing multiple local searches from randomly selected starting points, around the to be attacked victim. In this thesis we investigate the impact of these starting points on the performance of the attack, and find that the starting points significantly impact...
master thesis 2024
document
Out, Annabelle (author)
This project explores the prospects for interior design in a dual purpose train that can run both day and night for improved utilization and comfort.<br/><br/>Contemporary trains are categorized as either exclusively for daytime or nighttime use. Their interiors limit them to specific temporal contexts. For instance, in daytime trains,...
master thesis 2024
document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
van der Meulen, Jan (author)
Federated learning (FL) is a privacy preserving machine learning approach which allows a machine learning model to be trained in a distributed fashion without ever sharing user data. Due to the large amount of valuable text and voice data stored on end-user devices, this approach works particularly well for natural language processing (NLP)...
bachelor thesis 2024
document
Simonov, Alex (author)
Machine learning, a pivotal aspect of artificial intelligence, has dramatically altered our interaction with technology and our handling of extensive data. Through its ability to learn and make decisions from patterns and previous experiences, machine learning is growing in influence on different aspects of our lives. It is, however, shown that...
master thesis 2024
document
Maassen, Timo (author)
Research Objective &amp; Methodology<br/>The COVID-19 supply disruptions and the energy crisis triggered by the Russian-Ukrainian conflict emphasize the EU's structural supply dependencies and potential damages during crises. It underscores the critical risk factors, particularly Rare Earth Elements (REEs), which are highly susceptible to supply...
master thesis 2024
document
Fajtl, Michael (author)
In an era when rising threats put increasing pressure on security demands in state office buildings, the public trust in these same governmental institutions is on the decline, owing to a sense of detachment and lack of transparency.<br/>This detachment partially stems from the functional and physical separation of people’s civic and political...
master thesis 2024
document
Katona, Misha (author)
Through several contractions, stiff competition, and increasing passenger expectations, airports must evolve continually. One of the main avenues for this has been improving the efficiency of the security check- points, which are airports’ primary bottlenecks. Operational optimisation methods, such as resource and task scheduling are relatively...
master thesis 2024
document
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Lopuhaa-Zwakenberg, Milan (author), Heusdens, R. (author)
Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches...
journal article 2024
document
Bin Ab Rahim, M.S. (author), Reniers, G.L.L.M.E. (author), Yang, M. (author), Bajpai, Shailendra (author)
This paper presents a systematic literature review of risk assessment methods in the chemical process industry (CPI), focusing on process safety, process security, and resilience. We analyzed peer-reviewed articles from 2000 to 2022 using the PRISMA methodology and identified twelve predominant methods. Our findings reveal a shift towards...
journal article 2024
document
Pronk, M.J. (author), Hooijer, Aljosja (author), Eilander, Dirk (author), Haag, Arjen (author), de Jong, Tjalling (author), Vousdoukas, Michalis (author), Vernimmen, Ronald (author), Ledoux, H. (author), Eleveld, M.A. (author)
Coastal elevation data are essential for a wide variety of applications, such as coastal management, flood modelling, and adaptation planning. Low-lying coastal areas (found below 10 m +Mean Sea Level (MSL)) are at risk of future extreme water levels, subsidence and changing extreme weather patterns. However, current freely available elevation...
journal article 2024
document
Li, Meng (author), Shen, Yanzhe (author), Ye, Guixin (author), He, Jialing (author), Zheng, Xin (author), Zhang, Zijian (author), Zhu, Liehuang (author), Conti, M. (author)
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations arise from (1) how to track an anonymous- and-malicious data user who...
journal article 2024
document
Kaur, M. (author)
Technological systems and infrastructures form the bedrock of modern society and it is system administrators (sysadmins) who configure, maintain and operate these infrastructures. More often than not, they do so behind the scenes. The work of system administration tends to be unseen and, consequently, not well known. After all, do you think of...
doctoral thesis 2023
document
Kulshrestha, Shubhra (author)
This thesis titled ´Study of 5G Roaming Security´ investigates the potential network vulnerabilities of 5G roaming reference points. The 5G Non-Standalone (NSA) is already being deployed in different countries across the world. With 3G becoming obsolete, mobile communication will primarily depend on 4G and 5G-NSA. In the later stages of the 5G...
master thesis 2023
document
Giraud, Bastien (author)
The transition to green energy is reshaping the energy landscape, marked by increased integration of renewable energy sources, distributed resources, and the electrification of other energy sectors. These changes challenge grid security, particularly regarding the N-1 security criterion, a crucial factor in preventing blackouts. Furthermore,...
master thesis 2023
document
Gnanavarothayan, Kabilan (author)
The use of Internet of Things (IoT) devices has experienced an increase since its inception and is expected to continue to do so. However, this growth has also attracted individuals with malicious intentions. Botnet attacks on IoT devices have become more potent each year, exploiting new vulnerabilities and attacking more devices. Therefore, it...
master thesis 2023
Searched for: subject%3A%22security%22
(1 - 20 of 559)

Pages