Essays about: "attacks in peer to peer"
Showing result 1 - 5 of 12 essays containing the words attacks in peer to peer.
-
1. Towards Engineering Trustworthy Distributed Reputation Systems Over The Blockchain
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : Peer-to-peer (P2P) reputation systems, such as those used by eBay and Amazon, servean important role on the web, especially in E-commerce, as online reputation serves asa primary guiding factor for consumers in making informed decisions. The importanceof these systems, and also the increasing popularity of P2P and distributed systems, theissue of how to prevent and resist sybil and re-entry attacks becomes an important area ofresearch as they can impinge the integrity of those systems. READ MORE
-
2. Parasitic Tracking Mobile Wireless Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE
-
3. Automated security analysis of a SCADA system
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE
-
4. Children of Alcoholics: A systematic review on the correlation between parental alcoholism and youth criminality
University essay from Malmö universitet/Fakulteten för hälsa och samhälle (HS)Abstract : Abstract: Prior research indicates a growing number of Children of Alcoholics (CoAs) in Sweden, and increased levels of externalizing behaviours in these individuals. According to international research, externalizing behaviours as criminality are more often displayed in CoAs than children with non-alcoholic parents. READ MORE
-
5. Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Having a proper method of defense against attacks is crucial for web applications to ensure the safety of both the application itself and its users. Penetration testing (or ethical hacking) has long been one of the primary methods to detect vulnerabilities against such attacks, but is costly and requires considerable ability and knowledge. READ MORE