Advanced search

Showing result 1 - 5 of 25 essays matching the above criteria.

  1. 1. On intermittency in the turbulent asymptotic suction boundary layer

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Edoardo Foschi; [2023]
    Keywords : Turbulence; turbulent boundary layer; intermittency; numerical simulation; DNS; tripping; suction;

    Abstract : This thesis presents a series of direct numerical simulations (DNS) performed in order to understand the discrepancy in the literature regarding turbulent asymptotic suction boundary layers (TASBLs) at low Reynolds numbers. The hypothesis to be tested is that the main reason for higher turbulence intensities observed in experiments compared to DNS is that the latter exhibits intermittent patches of laminar flow, developing both temporally and spatially. READ MORE

  2. 2. Mapping the Attack Surface of Telecommunication Networks from the Public Internet

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jayshree Rathi; [2023]
    Keywords : Attack Surface Mapping; Telecommunication; Passive Reconnaissance; Mobile Network Operator; Public Internet; Kartläggning av Attackytan; Telekommunikation; Passiv Rekon- naissance; Mobilnätsoperatör; Offentligt Internet;

    Abstract : The telecommunications sector is increasingly connected to the Internet, resulting in an expanded attack surface accessible from the public Internet. This has increased the availability of information such as IP addresses, open ports, and other network details that anyone from the Internet can access. READ MORE

  3. 3. A Novel Framework For Detecting Subdomain State Against Takeover Attacks

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rigved Jayaprakash; Vishnu Kalariyil Venugopal; [2022]
    Keywords : Domain Name Servers; Subdomain; Subdomain Takeovers; Open-source tools; Google Cloud Platform; Dangling DNS Entry; Second Order Subdomain Takeover; Subdomain Enumeration and Discovery; subdomain validation;

    Abstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE

  4. 4. DNS Enumeration Techniques and Characterizing DNS vulnerabilities

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Genet Thorsell; [2022]
    Keywords : DNS security; DNS Enumeration; DNS vulnerabilities;

    Abstract : The Domain Name System is a worldwide global service, considered to be the heart and soul of the internet, that is used for mapping IP addresses to a hostname and vice-versa. Despite the fact that DNS is recognized as a critical internet service, the security aspects concerning its adoption are still highly neglected. READ MORE

  5. 5. Deep learning for non-intrusive sensing in turbulence with passive scalars

    University essay from KTH/Strömningsmekanik och Teknisk Akustik

    Author : Arivazhagan Geetha Balasubramanian; [2021]
    Keywords : Turbulent boundary layer; passive scalar; direct numerical simulation; Prandtl number; Machine learning; convolutional neural network; Turbulent gränsskikt; passiv skalär; direkt numerisk simulering; Prandtl-nummer; maskininlärning; faltningsneurala nätverk;

    Abstract : The near-wall modelling of turbulent flows has been an active field of research due to the computational cost associated with the direct numerical simulations of such flow, which are characterized by a wide range of length and time scales. With the recent advancements in technological capabilities, the availability of high-fidelity data has enabled the construction of data-driven approaches to model turbulence. READ MORE