Essays about: "TLS"

Showing result 16 - 20 of 88 essays containing the word TLS.

  1. 16. Analysis of coastal erosion between different flights of UAV

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Zhengran Yin; [2021]
    Keywords : Coastal erosion; UAV; Digital Surface Model; Slope; Elevation differences; Geomatics; Earth and Environmental Sciences;

    Abstract : More than 600 million people are living in coastal areas in the world. According to the trend of population migration, the global coastal area population may increase to more than 1 billion by 2050. READ MORE

  2. 17. Scanning and Host Fingerprinting Methods for Command and Control Server Detection

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yuki Nakamura; Björn Åström; [2021]
    Keywords : command and control; C2; CnC; botnet; scanning; probing;

    Abstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE

  3. 18. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  4. 19. Which News Articles are You Reading? : Using Fingerprinting to Attack Internal Pages of News Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Martin Lindblom; [2021]
    Keywords : Fingerprint Attack; Privacy; Transport Layer Security; TLS; Real-World Scenario; News Websites; News Articles; Proxy-Less Labelling Heuristic; Transmission Control Protocol; TCP; Internal Pages; Automatic Data Collection;

    Abstract : When performing fingerprinting attacks against websites in a controlled environment astudy may achieve very promising results. However, these can be misleading as the closedworld setting may not accurately represent the real-world. READ MORE

  5. 20. Expression of the Sloppymerase™ in NIH/3T3 Cells: Exploring the Versatility of an Error Prone Fusion Polymerase

    University essay from Uppsala universitet/Institutionen för farmaceutisk biovetenskap

    Author : Mikaela Mattsson; [2021]
    Keywords : ;

    Abstract : The aim of this project is to assess the versatility of the Sloppymerase by performing stable transfection in NIH/3T3 cells and decide whether this cell line can be a candidate for further research on the Sloppymerase as a cancer model. The American cancer society predicts 1,806,590 new cancer cases in the US in 2020. READ MORE