Sökning: "Eavesdropping"
Visar resultat 6 - 10 av 47 uppsatser innehållade ordet Eavesdropping.
6. Penetration testing of a smart speaker
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. LÄS MER
7. A case study of unauthorized login attempts against honeypots via remote desktop
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER
8. Methods for Co-Orbital Threat Assessment in Space
Master-uppsats, KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanikSammanfattning : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. LÄS MER
9. Federated Learning for edge computing : Real-Time Object Detection
Magister-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : In domains where data is sensitive or private, there is a great value in methods that can learn in a distributed manner without the data ever leaving the local devices. Federated Learning (FL) has recently emerged as a promising solution to collaborative machine learning challenges while maintaining data privacy. LÄS MER
10. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER