Search for dissertations about: "peer to peer attacks"

Found 5 swedish dissertations containing the words peer to peer attacks.

  1. 1. Conflicts in Information Ecosystems

    Author : Bengt Carlsson; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Multiagentsystem; Informationsekosystem; Spelteori; Antagonistiska grupper;

    Abstract : The main topic of this thesis concerns the study of how conflicting interests of software agents within an information ecosystem may cause cooperative behavior. Since such agents act on the behalf of their human owners, which often act in their own interest, this will sometimes result in malignant acts. READ MORE

  2. 2. Robust and Efficient Federated Learning for IoT Security

    Author : Han Wang; Shahid Raza; György Dán; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Internet of Things; Federated Learning; Machine Learning; Intrusion Detection System; Communication Efficiency; Robustness; Adversarial AI; Device Fingerprinting; Device Identification; Cyber Threat Intelligence; Computer Science with specialization in Computer Communication; Datavetenskap med inriktning mot datorkommunikation;

    Abstract : The widespread adoption of Internet of Things (IoT) devices has led to substantial progress across various industrial sectors, including healthcare, transportation, and manufacturing. However, these devices also introduce significant security vulnerabilities because they are often deployed without adequate security measures, making them susceptible to cyber threats. READ MORE

  3. 3. Security and trust mechanisms for groups in distributed services

    Author : Claudiu Duma; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer science; Datavetenskap;

    Abstract : Group communication is a fundamental paradigm in modem distributed services, with applications in domains such as content distribution, distributed games, and collaborative workspaces. Despite the increasing interest in group-based services and the latest developments in efficient and reliable multi cast, the secure management of groups remains a major challenge for group communication. READ MORE

  4. 4. MobiLeak : Security and Privacy of Personal Data in Mobile Applications

    Author : Pasquale Stirparo; Sead Muftic; Steven Marcus Furnell; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; mobile application; security; privacy; android; forensics; malware; Informations- och kommunikationsteknik; Information and Communication Technology; Computer Science; Datalogi;

    Abstract : Smartphones and mobile applications have become an essential part of our daily lives. People always carry their smartphones with them and rely on mobile applications for most of their tasks: from checking emails for personal or business purposes, to engaging in social interactions via social networks, from trading online or checking their bank accounts to communicating with families and friends through instant messaging applications. READ MORE

  5. 5. Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments

    Author : Irvin Homem; Theo Kanter; Panagiotis Papapetrou; Rahim Rahmani; Fredrik Björck; Stockholms universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer forensics; network forensics; mobile devices; mobile forensics; cloud computing; semantic web; hypervisors; virtualization; remote acquisition; automation; evidence analysis; correlation; P2P; bittorrent; datalogi; Computer Science; informationssäkerhet; Information Systems Security;

    Abstract : Cybercrime and related malicious activity in our increasingly digital world has become more prevalent and sophisticated, evading traditional security mechanisms. Digital forensics has been proposed to help investigate, understand and eventually mitigate such attacks. READ MORE