Browsing by Keywords "ασφάλεια διαδικτύου"
Now showing items 1-5 of 5
-
Machine learning-based active operating system fingerprinting dataset.
Η.Μ.U, School of Engineering (ScENG), Electrical and Computer Engineering Dept
Authors:
Thesis advisor:
Publication Date: 2022-10-21Cyber-attacks have expanded significantly and progressed in effectiveness over the past few years. As a result, vulnerabilities of targeted computer and network systems can be exploited remotely. Before the initialization ... -
Web banking and online scams.
T.E.I. of Crete, School of Management and Economics (SDO), Department of Accounting and Finance
Authors:
Thesis advisor:
Publication Date: 16-06-2015Our thesis refers to Internet Banking and online scams. The objective of this paper is to describe, analyze and draw some conclusions on electronic banking. The risks posed and their responses. -
Network traffic analysis of critical infrastructures using Apache Spot.
H.M.U., School of Engineering (ScENG) MSc in Informatics & Multimedia
Authors:
Thesis advisor:
Publication Date: 2021-02-03Apache Spot is an incubating project of the Foundation, used for anomaly detection in large volumes of network telemetry data. It is of particular interest and as it combines the fields of Cybersecurity, Big Data, and ... -
Detection and treatment of safety matters for web applications.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 07-10-2014The aim of this thesis is to detect and study vulnerabilities of web applications running on the internet as well as shielding them from malicious attacks . We will see the anatomy of a number of attacks, the dangers and ... -
Penetration testing and vulnerability assessment with the use of Metasploit Framework.
T.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineering
Authors:
Thesis advisor:
Publication Date: 15-10-2013In this thesis, the features, the fundamentals and the management of the Metasploit Framework will be examined, with the final goal being penetration testing and vulnerability assessment of networks and copmuter systems. ...