Essays about: "hidden web"

Showing result 1 - 5 of 18 essays containing the words hidden web.

  1. 1. Anomaly detection in user behavior of websites using Hierarchical Temporal Memories : Using Machine Learning to detect unusual behavior from users of a web service to quickly detect possible security hazards.

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Victor Berger; [2017]
    Keywords : anomaly detection; machine learning; HTM;

    Abstract : This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal anomaly detection. It is here applied to the problem of anomaly detec-tion in user behavior of web services, which is getting moreand more important in a network security context. READ MORE

  2. 2. Development of a tool allowing to create and use JSON schemas so as to enhance the validation of existing projects

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Simon Charles-Elie; [2017]
    Keywords : Application programming interface; Representational state transfer; JSON schema; Resource; Route;

    Abstract : A mobile application is typically divided into two sides that communicate with each other: the front-end (i.e. what the user can see and interact with on the phone) and the back-end (the hidden ”server” side, which processes requests from the front-end). READ MORE

  3. 3. Investigating user behavior by analysis of gaze data : Evaluation of machine learning methods for user behavior analysis in web applications

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Fredrik Dahlin; [2016]
    Keywords : Eye tracking; User behavior; Web applications; Machine learning; Hidden Markov model; Restricted Boltzmann machine;

    Abstract : User behavior analysis in web applications is currently mainly performed by analysis of statistical measurements based on user interactions or by creation of personas to better understand users. Both of these methods give great insights in how the users utilize a web site, but do not give any additional information about what they are actually doing. READ MORE

  4. 4. The users’ perspective and preference on three user interface website design patterns and their usability

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Ivan Dimov; [2016]
    Keywords : usability; captcha; hamburger; icon; homepage; website design pattern; qualitative; user interface;

    Abstract : This study is qualitative and interpretive in nature. It examines the perception of 6 people aged 23-32 with decent experience in using the Web on the usability of three user interface website design patterns. READ MORE

  5. 5. Torminator: A Tor fingerprinting suite : Or how the Tor-network might get a surprise attack from the future. “I’ll be back” – The Terminator

    University essay from KTH/Kommunikationsnät

    Author : Petter Salminen; [2015]
    Keywords : ;

    Abstract : Tor is a very popular anonymisation software and network. For which wecreated Torminator, a fingerprinting suite written in the Java programming language.Fingerprinting is an attack type applicable to Tor utilising side-channelinformation from the network packets. READ MORE