Essays about: "validation threats"
Showing result 1 - 5 of 16 essays containing the words validation threats.
-
1. Identifying Threat Factors of Vulnerabilities in Ethereum Smart Contracts
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. READ MORE
-
2. Investigating the influence of the tidal regime on harbour porpoise Phocoena phocoena distribution in Mount’s Bay, Cornwall
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : Investigating the influence of the tidal regime on harbour porpoise Phocoena phocoena distribution in Mount’s Bay, Cornwall Abstract Unintentional by-catch in fishing gear is a significant cause of mortality of harbour porpoises in UK waters. Understanding the spatial distribution of harbour porpoises at fine scales and how this changes over time is essential when trying to understand where these lethal interactions might occur. READ MORE
-
3. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE
-
4. Input Validation and Input Sanitization for Web Applications
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The rise of web-based applications is rapidly increasing with time and demand. As more and more web applications are being developed, so are the threats against these web applications' user-base. Input-basedattacks against web applications are becoming more common. A new task is in the hands of the developers, namely input handling. READ MORE
-
5. Systems methodology for Analysis of Airborne Electronic Warfare Systems
University essay fromAbstract : This report is one of the first to examine how system methodology can be applied as a tool to facilitate a holistic view of fighter aircraft survivability. This is done through the application of a modified version of multi-agent influence diagrams (MAIDs), as an analytical tool of two generic one-on-one scenarios based on Robert E. READ MORE