SK

S.B.M. Kaptein

Authored

2 records found

The internet consists of many networks connected by the BGP protocol and can easily be manipulated by a hacker. Every day, hackers reroute internet traffic and use that to impersonate entities such as companies, devices and humans. To detect this rerouting, which is also know as ...
The online presence of e-commerce platforms, publishers, and other businesses has been increasing with the rise of internet use. These companies regularly expose their (potential) customers to massive amounts of media and products. It is vital for these companies to elicit intera ...