Essays about: "Domain name"

Showing result 1 - 5 of 49 essays containing the words Domain name.

  1. 1. Data Augmentations for Improving Vision-Based Damage Detection : in Land Transport Infrastructure

    University essay from KTH/Lantmäteri – fastighetsvetenskap och geodesi

    Author : Punnawat Siripatthiti; [2023]
    Keywords : Computer Vision; Data Augmentation; Object Detection; Crack Detection; Road Damage Detection; Sleeper Defect Detection; datorseende; dataökning; objektdetektering; sprickdetektering; vägbeläggning; järnvägsslipers;

    Abstract : Crack, a typical term most people know, is a common form of distress or damage in road pavements and railway sleepers. It poses significant challenges to their structural integrity, safety, and longevity. Over the years, researchers have developed various data-driven technologies for image-based crack detection in road and sleeper applications. READ MORE

  2. 2. Further Developing Preload Lists for the Tor Network

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Daniel Bahmiary; [2023]
    Keywords : Tor; DNS; Preload list; Crawling; Tor; DNS; Preload lista; Webbkrypning;

    Abstract : A recently proposed defense for the anonymity network Tor uses preload lists of domains to determine what should be cached in the Domain Name System (DNS) caches of Tor relays. The defense protects against attacks that infer what is cached in Tor relays. READ MORE

  3. 3. Ethical Hacking of a Virtual Reality Headset

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olivia Höft; [2023]
    Keywords : Cyber Security; Ethical Hacking; Penetration Test; Virtual Reality Headset; Cyber Säkerhet; Etisk Hackning; Penetrationstest; Virituella Verklighets Glasögon;

    Abstract : Weak product cybersecurity is an increasing problem within society, and a growing consumer product is the Virtual Reality (VR) headset. This thesis investigated common vulnerabilities in Internet of Things (IoT) consumer products and performed proof-of-concept exploits on the Meta Quest VR headset. READ MORE

  4. 4. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  5. 5. Pre-training a knowledge enhanced model in biomedical domain for information extraction

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Xi Yan; [2022]
    Keywords : bio-nlp; knowledge enhanced language model; pre-training; information extraction. transformer;

    Abstract : While recent years have seen a rise of research in knowledge graph enrichedpre-trained language models(PLM), few studies have tried to transfer the work to the biomedical domain. This thesis is a first attempt to pre-train a large-scalebiological knowledge enriched language model (KPLM). Under the frameworkof CoLAKE (T. Sun et al. READ MORE