SlideShare a Scribd company logo
1 of 37
Download to read offline
Subhasis Thakur and John Breslin
Data Science Institute
National University of Ireland Galway
Collusion attack from
hubs in the blockchain
offline channel
network
“Collusion
practices in a
West of Ireland
livestock mart”
- Curtin & Varley, 1982
2
Scalability problem
3
Offline channels
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Bitcoin Lightning Network
20
Hubs in
Lightning
Network
21
Research problem: collusion (eclipse)
attack
● Can a collusion of hubs execute a collusion attack against
another set of hubs?
Results
● Mathematical model of collusion attack on the channel
network
● Likelihood of collusion attack using Banzhaf indices
● We found that there are 62 nodes who can execute
collusion attacks against 90% of their neighbours in the
Lightning Network
22
23
Model of collusion attack
Neighborhood of Vi
with distance d
24
Model of collusion attack
Targets of a collusion attack is a pair
of hubs in its neighborhood
25
Model of collusion attack
Vi
forms a collusion to
produce a cut between
hubs V1
and V2
in its
neighborhood
26
Model of collusion
attack: how likely
that a hub can orch-
estrate an attack?
Collusion formation as
a cooperative game
27
Ability to orchestrate collusion =
Banzhaf index
28
Banzhaf index
Banzhaf index = (Number of coalitions where Vi
is a critical
player) / (Number of coalitions where Vi
is a member)
29
Banzhaf index (in terms of the ability
to orchestrate collusion)
Banzhaf index = (Number of collusions where Vi
is a critical
player) / (Number of collusions where Vi
is a member)
30
Potential of collusion attacks
A high standard deviation would indicate that there are few hubs
who can easily execute a collusion attack while the remaining
hubs are unlikely to execute collusion attack
31
● The probability that a hub can successfully execute a
collusion attack increases as its degree increases
● If hubs of the hub network have a uniform degree then,
Banzhaf indices are approximately equal
● Uniform Banzhaf indices may prevent collusion attacks in
the hub network
Method to reduce possibility of
collusion attacks
32
Evaluation: data
Bitcoin Lightning Network (1st March 2019)
● # nodes = 2810
● # edges = 22596
● Average degree = 16
● Minimum degree = 1
● Maximum degree = 961
33
Evaluation:
algorithm to
compute the
Banzhaf index
● Relation between the Banzhaf index and the diameter of the network
● The uniformity of Banzhaf increases as the diameter of the network decreases 34
35
Vulnerability due to collusion attack
Vulnerability w.r.t. node Vi
= (# of neighbours with a Banzhaf
index less than Vi
) / (Size of neighbourhood of Vi
)
36
● There are 62 nodes who can execute collusion attacks against 90% of their
neighbors in the Lightning Network
37
Thank you:
any questions?
subhasis.thakur@nuigalway.ie
john.breslin@nuigalway.ie

More Related Content

Similar to Collusion Attack from Hubs in the Blockchain Offline Channel Network

Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network securityargh61
 
Limiting self propagating malware based
Limiting self propagating malware basedLimiting self propagating malware based
Limiting self propagating malware basedIJNSA Journal
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...AAKASH S
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsJPINFOTECH JAYAPRAKASH
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Collusion Attack from Hubs in the Blockchain Offline Channel Network (20)

Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
Limiting self propagating malware based
Limiting self propagating malware basedLimiting self propagating malware based
Limiting self propagating malware based
 
Injectionofattacksinmanets
InjectionofattacksinmanetsInjectionofattacksinmanets
Injectionofattacksinmanets
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
D0961927
D0961927D0961927
D0961927
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
C0363012014
C0363012014C0363012014
C0363012014
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
C010631015
C010631015C010631015
C010631015
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocols
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

More from John Breslin

Ireland: Island of Innovation and Entrepreneurship
Ireland: Island of Innovation and EntrepreneurshipIreland: Island of Innovation and Entrepreneurship
Ireland: Island of Innovation and EntrepreneurshipJohn Breslin
 
Old Ireland in Colour
Old Ireland in ColourOld Ireland in Colour
Old Ireland in ColourJohn Breslin
 
A Balanced Routing Algorithm for Blockchain Offline Channels using Flocking
A Balanced Routing Algorithm for Blockchain Offline Channels using FlockingA Balanced Routing Algorithm for Blockchain Offline Channels using Flocking
A Balanced Routing Algorithm for Blockchain Offline Channels using FlockingJohn Breslin
 
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...Collaborative Leadership to Increase the Northern & Western Region’s Innovati...
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...John Breslin
 
TRICS: Teaching Researchers and Innovators how to Create Startups
TRICS: Teaching Researchers and Innovators how to Create StartupsTRICS: Teaching Researchers and Innovators how to Create Startups
TRICS: Teaching Researchers and Innovators how to Create StartupsJohn Breslin
 
Entrepreneurship is in Our DNA
Entrepreneurship is in Our DNAEntrepreneurship is in Our DNA
Entrepreneurship is in Our DNAJohn Breslin
 
Galway City Innovation District
Galway City Innovation DistrictGalway City Innovation District
Galway City Innovation DistrictJohn Breslin
 
Innovation Districts and Innovation Hubs
Innovation Districts and Innovation HubsInnovation Districts and Innovation Hubs
Innovation Districts and Innovation HubsJohn Breslin
 
Disciplined mHealth Entrepreneurship
Disciplined mHealth EntrepreneurshipDisciplined mHealth Entrepreneurship
Disciplined mHealth EntrepreneurshipJohn Breslin
 
Searching for Startups
Searching for StartupsSearching for Startups
Searching for StartupsJohn Breslin
 
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...John Breslin
 
Innovation and Entrepreneurship: Tips, Tools and Tricks
Innovation and Entrepreneurship: Tips, Tools and TricksInnovation and Entrepreneurship: Tips, Tools and Tricks
Innovation and Entrepreneurship: Tips, Tools and TricksJohn Breslin
 
Growing Galway's Startup Community
Growing Galway's Startup CommunityGrowing Galway's Startup Community
Growing Galway's Startup CommunityJohn Breslin
 
Startup Community: What Galway Can Do Next
Startup Community: What Galway Can Do NextStartup Community: What Galway Can Do Next
Startup Community: What Galway Can Do NextJohn Breslin
 
Adding More Semantics to the Social Web
Adding More Semantics to the Social WebAdding More Semantics to the Social Web
Adding More Semantics to the Social WebJohn Breslin
 
Communities and Tech: Build Which and What Will Come?
Communities and Tech: Build Which and What Will Come?Communities and Tech: Build Which and What Will Come?
Communities and Tech: Build Which and What Will Come?John Breslin
 
Data Analytics and Industry-Academic Partnerships: An Irish Perspective
Data Analytics and Industry-Academic Partnerships: An Irish PerspectiveData Analytics and Industry-Academic Partnerships: An Irish Perspective
Data Analytics and Industry-Academic Partnerships: An Irish PerspectiveJohn Breslin
 
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...John Breslin
 
John Breslin at the Innovation Academy
John Breslin at the Innovation AcademyJohn Breslin at the Innovation Academy
John Breslin at the Innovation AcademyJohn Breslin
 
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...John Breslin
 

More from John Breslin (20)

Ireland: Island of Innovation and Entrepreneurship
Ireland: Island of Innovation and EntrepreneurshipIreland: Island of Innovation and Entrepreneurship
Ireland: Island of Innovation and Entrepreneurship
 
Old Ireland in Colour
Old Ireland in ColourOld Ireland in Colour
Old Ireland in Colour
 
A Balanced Routing Algorithm for Blockchain Offline Channels using Flocking
A Balanced Routing Algorithm for Blockchain Offline Channels using FlockingA Balanced Routing Algorithm for Blockchain Offline Channels using Flocking
A Balanced Routing Algorithm for Blockchain Offline Channels using Flocking
 
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...Collaborative Leadership to Increase the Northern & Western Region’s Innovati...
Collaborative Leadership to Increase the Northern & Western Region’s Innovati...
 
TRICS: Teaching Researchers and Innovators how to Create Startups
TRICS: Teaching Researchers and Innovators how to Create StartupsTRICS: Teaching Researchers and Innovators how to Create Startups
TRICS: Teaching Researchers and Innovators how to Create Startups
 
Entrepreneurship is in Our DNA
Entrepreneurship is in Our DNAEntrepreneurship is in Our DNA
Entrepreneurship is in Our DNA
 
Galway City Innovation District
Galway City Innovation DistrictGalway City Innovation District
Galway City Innovation District
 
Innovation Districts and Innovation Hubs
Innovation Districts and Innovation HubsInnovation Districts and Innovation Hubs
Innovation Districts and Innovation Hubs
 
Disciplined mHealth Entrepreneurship
Disciplined mHealth EntrepreneurshipDisciplined mHealth Entrepreneurship
Disciplined mHealth Entrepreneurship
 
Searching for Startups
Searching for StartupsSearching for Startups
Searching for Startups
 
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...
Intellectual Property: Protecting Ideas, Designs and Brands in the Real World...
 
Innovation and Entrepreneurship: Tips, Tools and Tricks
Innovation and Entrepreneurship: Tips, Tools and TricksInnovation and Entrepreneurship: Tips, Tools and Tricks
Innovation and Entrepreneurship: Tips, Tools and Tricks
 
Growing Galway's Startup Community
Growing Galway's Startup CommunityGrowing Galway's Startup Community
Growing Galway's Startup Community
 
Startup Community: What Galway Can Do Next
Startup Community: What Galway Can Do NextStartup Community: What Galway Can Do Next
Startup Community: What Galway Can Do Next
 
Adding More Semantics to the Social Web
Adding More Semantics to the Social WebAdding More Semantics to the Social Web
Adding More Semantics to the Social Web
 
Communities and Tech: Build Which and What Will Come?
Communities and Tech: Build Which and What Will Come?Communities and Tech: Build Which and What Will Come?
Communities and Tech: Build Which and What Will Come?
 
Data Analytics and Industry-Academic Partnerships: An Irish Perspective
Data Analytics and Industry-Academic Partnerships: An Irish PerspectiveData Analytics and Industry-Academic Partnerships: An Irish Perspective
Data Analytics and Industry-Academic Partnerships: An Irish Perspective
 
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...
“I Like” - Analysing Interactions within Social Networks to Assert the Trustw...
 
John Breslin at the Innovation Academy
John Breslin at the Innovation AcademyJohn Breslin at the Innovation Academy
John Breslin at the Innovation Academy
 
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...
Engaging Citizens in Research and Innovation: Opportunities and Challenges Af...
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Collusion Attack from Hubs in the Blockchain Offline Channel Network