Explore the fundamental idea behind replay attacks with a practical example.
Also find me here:
Baeldung Author
Subham Datta
I'm currently pursuing Ph.D. degree in Computer Engineering from the University of Cyprus. I'm also working at KIOS Research and Innovation Center of Excellence. My research area includes Cyber Security, Algorithms, Machine Learning. In my free time, I love watching cricket and movies.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (35)
- OS (24)
- Security (23)
- Algorithms (23)
- Trees (11)
- Graphs (8)
- Programming (7)
- Math and Logic (7)
- Data Structures (7)
- Path Finding (4)
- Sorting (2)
- Software Architecture (2)
- Graph Traversal (2)
- Core Concepts (2)
- Artificial Intelligence (2)
- Web (1)
- Searching (1)
- Machine Learning (1)
- Concurrency (1)
How Do Filesystems Handle Concurrent Read/Write?
Filed under Concurrency
Explore the different strategies that file systems use to manage concurrent read and write operations.
How Does 1’s Complement Work in Error Detection?
Filed under Security
Learn how to use 1’s complement technique to detect errors in data transmission.
Difference Between Goal-based and Utility-based Agents
Filed under Artificial Intelligence
Explore two types of AI agents: goal-based and utility-based agents.
Memory Management: Inverted Paging
Filed under OS
Explore a memory management technique: inverted paging.
Differences Between Cloud, Grid and Cluster
Filed under Networking, Software Architecture
Explore the general idea of cloud, grid, and cluster from a computer networking perspective.
Understanding Piggybacking in Networks
Filed under Networking
Explore the piggybacking technique which allows data centers to connect with each other by using the existing connections of other organizations.
Differences Between Network Edge and Core
Filed under Networking
Explore two networking design structures: edge and core networks.
System Call vs. System Interrupt
Filed under OS
Explore system calls and system interrupts in detail.