Essays about: "attacks in peer to peer"

Showing result 1 - 5 of 12 essays containing the words attacks in peer to peer.

  1. 1. Towards Engineering Trustworthy Distributed Reputation Systems Over The Blockchain

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Georg Grankvist; Paul Moustakas; [2022]
    Keywords : Blockchain; Ethereum; Smart Contract; NFT; Bank-ID; Software Architecture; Reputation Systems; Sybil Attack; Re-entry Attack; P2P; Distributed;

    Abstract : Peer-to-peer (P2P) reputation systems, such as those used by eBay and Amazon, servean important role on the web, especially in E-commerce, as online reputation serves asa primary guiding factor for consumers in making informed decisions. The importanceof these systems, and also the increasing popularity of P2P and distributed systems, theissue of how to prevent and resist sybil and re-entry attacks becomes an important area ofresearch as they can impinge the integrity of those systems. READ MORE

  2. 2. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  3. 3. Automated security analysis of a SCADA system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Akzharkyn Duisembiyeva; [2020]
    Keywords : threat modeling; DSL; MAL; cyber security; SCADA; hotmodellering; DSL; MAL; cybersäkerhet; SCADA;

    Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE

  4. 4. Children of Alcoholics: A systematic review on the correlation between parental alcoholism and youth criminality

    University essay from Malmö universitet/Fakulteten för hälsa och samhälle (HS)

    Author : Lina Miranda Möllerstedt; [2019]
    Keywords : Children of Alcoholics; Youth Criminality; Offspring Deviance; Alcohol use Disorder;

    Abstract : Abstract: Prior research indicates a growing number of Children of Alcoholics (CoAs) in Sweden, and increased levels of externalizing behaviours in these individuals. According to international research, externalizing behaviours as criminality are more often displayed in CoAs than children with non-alcoholic parents. READ MORE

  5. 5. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Henrik Ottosson; Per Lindquist; [2018]
    Keywords : Web Applications; Vulnerabilitiy Scanning; Automation; Ethical Hacking; Penetration Testing; Information Security;

    Abstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE