Essays about: "thesis for web Security evaluation"

Showing result 1 - 5 of 30 essays containing the words thesis for web Security evaluation.

  1. 1. Exploring the Viability of PageRank for Attack Graph Analysis and Defence Prioritization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcus Dypbukt Källman; [2023]
    Keywords : Cybersecurity; PageRank; Attack Graphs; Threat analysis; Threat modelling; Cybersäkerhet; PageRank; Attackgrafer; Hotanalys; Hotmodellering;

    Abstract : In today's digital world, cybersecurity is becoming increasingly critical. Essential services that we rely on every day such as finance, transportation, and healthcare all rely on complex networks and computer systems. READ MORE

  2. 2. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Mryam Teklya Suyum; [2023]
    Keywords : Distributed Systems; WebRTC; WebSocket; HTTPS; Signaling Server; Peer-to-Peer Communication; RTP; RTCPeerConnection API; Performance Analysis; Latency RTT; Jitter; Packet Loss; Distribuerade system; WebRTC; WebSocket; HTTPS; signalserver; peer-to-peer-kommunikation; RTP; RTCPeerConnection API; prestandaanalys; latens RTT; jitter; paketförlust;

    Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE

  3. 3. Minimator: A Serious Game on Zero-Day Markets

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ehud Cseresnyes; Hans Sharma; [2022]
    Keywords : serious games; zero-days; zero-day markets; exploits; vulnerabilities; game theory; design science; cyber warfare; cyber conflict; national security; software security;

    Abstract : Zero-days are vulnerabilities that the software vendor does not know about and thus cannot provide a patch for. Their value has caused markets to develop, divided by the purchase intention. This thesis focuses on the white and grey markets, that is those buying to patch and those buying to exploit. READ MORE

  4. 4. A decentralized Git version controlsystem : A proposed architecture and evaluation of decentralized Git using DAG-based distributed ledgers

    University essay from Linköpings universitet/Programvara och system

    Author : Christian Habib; Ilian Ayoub; [2022]
    Keywords : Blockchain; Distributed ledger technology; Git; Version control systems; Software Security; Web3; Misuse cases;

    Abstract : This thesis proposes an implementation for a decentralized version of the Git version controlsystem. This is achieved using a simple distributed DAG ledger. The thesis analyzeshow the decentralization of Git affects security. Use and misuse cases are used to compareand evaluate conventional Git web services and a decentralized version of Git. READ MORE

  5. 5. Performance analysis of adaptive streaming algorithms for a low-latency environment

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Antonio Kevo; Albert Sjölund; [2022]
    Keywords : Technology and Engineering;

    Abstract : Streaming video over the internet can face issues when met with poor and varying network conditions, which can be especially noticeable when streaming live video such as security footage or video calling. To handle this, there exists congestion control algorithms that monitor network conditions based on feedback from the receiver and adapt the video output. READ MORE