Essays about: "ip security"
Showing result 1 - 5 of 109 essays containing the words ip security.
-
1. Unraveling Paradoxical Tensions in Digital Servitization Ecosystems : A case study in the mining industry
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : Purpose - This study aims to understand what paradoxical tensions arise within an ecosystem when companies collectively pursue digital servitization and how these tensions impact value co-creation. Method - The study is an explorative single-case study based on the mining industry in Sweden and involves respondents from industry-leading organizations. READ MORE
-
2. Evaluation of Open-source Threat Intelligence Platforms Considering Developments in Cyber Security
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. With the increase in cyberattacks and cyber related threats, it is of great concern that the area still lacks the needed amount of practitioners. Open-source threat intelligence platforms are free platforms hosting related information to cyber threats. READ MORE
-
3. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
4. Mapping the Attack Surface of Telecommunication Networks from the Public Internet
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE
-
5. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE