Browsing by Subject "Computer security"
Now showing items 1-15 of 15
-
Academic document verification using SSI and blockchain technology
(Brac University, 2023-09)Academic certificates are evidence of qualification for their recipients. Although academic data is regularly transmitted by institutes, the procedure of transferring and verifying this data is usually tiring and ... -
Blockchain based Secured Multipurpose Identity (SMID) management system for smart cities
(Brac University, 2021-09)Blockchain, the decentralized architecture and distributed public ledger technology that enables Bitcoin, has recently drawn a strong interest from governments, nancial institutions, and high-tech companies. In modern ... -
Covert data transmission using secret-sharing and network steganography
(Brac University, 2024-01)The present has made us more dependent on technology than ever before. As technology develops and new fields emerge, it has become more complicated to maintain a safe, secure, and covert environment for transmitting ... -
Cross banking transaction system using multichain blockchain systems
(Brac University, 2024-01)Money is the most common form of exchange for goods and services across the world. Ensuring that this money is kept safe and transferred to the right person has been essential ever since the concept of money has been ... -
Demands of Cybersecurity in Bangladeshi Financial Sector
(Brac University, 2022-06)This report is the comprehensive highlight of my whole internship experience at Enterprise Infosec Consultants. It is aimed to portray to the whole company and my research project, which is based on ‘The demand of ... -
Enhanced and secured hybrid steganography model for hiding large data
(Brac University, 2023-05)Recent works on steganography basically are focused on various network layers and multiple data-hiding techniques. These researches lead to image manipula- tion, contortion and small-scale payload. This paper proposes a ... -
Ensure security in supply chain with blockchain technology
(Brac University, 2022-09-29)Supply chain essentially means the network between the suppliers and distributors to produce and distribute products to the final consumers which comprises various activities, entities, databases and responsibilities. ... -
Ensuring CIA triad using EJBCA solution digital certificate trust model
(Brac University, 2022-05)At present ensuring confidentiality, integrity and availability of information is a big challenge. Cyber-attacks such as man in the middle attack, eavesdropping, spoofing is commonly known inside threats. Leakage of ... -
An investigation on implementations of theoretical whitebox cryptographic solutions
(Brac University, 2024-01)Whitebox Cryptography techniques are those which are aimed at protecting software implementations of cryptographic algorithms against key recovery in unprotected devices. The sensitive data embedded in the code is the ... -
A machine learning based approach for DDos attack detection
(Brac University, 2023-09)The modern era saw the rise of technologies in almost every sector. Computers are gradually becoming faster and smaller, also allowing people to utilize them almost everywhere. As computer technology has become an important ... -
Mitigating DDoS attacks using a resource sharing network
(Brac University, 2021-10)Cloud computing is crucial to the internet just as air is crucial to breathing. Most users do not even come to think how the cloud architecture is one of the giant pillars on which the entire internet and all its related ... -
A performance comparison between machine learning models on zero-day attack detection
(Brac University, 2021-01)Traditional IDS has been shielding against cyber threats for many years but it falls short on detecting zero-day attacks. These are the attacks that are unique with unknown attack patterns and mutating attack signatures ... -
Privacy-preserving healthcare data management system using blockchain technology
(Brac University, 2022-05)In recent years, blockchain technology has gotten plenty of attention, with rising interest in an exceedingly type of way resembling as-Banking, Telecommunication, IoT, aid etc. Each different sector, Blockchain has ... -
ROBB: recurrent proximal policy optimization reinforcement learning for optimal block formation in bitcoin blockchain network
(Brac University, 2023-07)Blockchain is a ground-breaking technology that has changed how we manage and store protected data. It is a decentralized ledger that enables safe, open, and unchangeable record-keeping. It relies on a distributed network ... -
ShielDroid: a hybrid ML and DL approach for real-time malware detection system in Android
(Brac University, 2021-09)Due to the rapid development of the advanced world of technology, there is a high increase in devices such as smartphones and tablets, which increase the number of applications used. Though an application has to pass the ...