Sökning: "Data Tampering"
Visar resultat 1 - 5 av 20 uppsatser innehållade orden Data Tampering.
1. The Deeper Investigation of SmartHealthcare Systems using 5G Security
Master-uppsats, Blekinge Tekniska HögskolaSammanfattning : A promising approach to raising the caliber and accessibility of healthcare services is the development of Smart Healthcare Systems. However, the union of wireless networks and smart medical devices has created additional security issues, such as the possibility of identity theft, data breaches, and denial-of-service assaults. LÄS MER
2. A General Purpose Analog Circuit to Accumulate Data From Resistive Sensors
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Minimizing the need to physically adjust hardware platforms used for sensor measurements during the construction phase of an electric vehicle can be beneficial. Since different sensors have different measuring ranges a hardware platform used for a specific sensor might not work for another one, without physically tampering with it. LÄS MER
3. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. LÄS MER
4. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. LÄS MER
5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. LÄS MER