Sökning: "Eavesdropping"

Visar resultat 6 - 10 av 47 uppsatser innehållade ordet Eavesdropping.

  1. 6. Penetration testing of a smart speaker

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Amin Nouiser; [2023]
    Nyckelord :Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Sammanfattning : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. LÄS MER

  2. 7. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER

  3. 8. Methods for Co-Orbital Threat Assessment in Space

    Master-uppsats, KTH/Lättkonstruktioner, marina system, flyg- och rymdteknik, rörelsemekanik

    Författare :Mathias Dahlman; [2023]
    Nyckelord :threats in space; threat assessment; Lambert s problem; genetic algorithms; NSGA-II; space surveillance and tracking capabilities; hot i rymden; hotbedömning; Lamberts problem; genetiska algoritmer; NSGA-II; inmätning och övervakning av rymdobjekt;

    Sammanfattning : This study investigates methods for assessing threats in space. Space services are crucial to both civilian and military capabilities, and a loss of such systems could have severe consequences. Space systems are exposed to various types of threats. LÄS MER

  4. 9. Federated Learning for edge computing : Real-Time Object Detection

    Magister-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Ardit Memia; [2023]
    Nyckelord :Federated Learning; Artificial Intelligence; Machine Learning; Edge computing; Object Detection; Decentralized AI;

    Sammanfattning : In domains where data is sensitive or private, there is a great value in methods that can learn in a distributed manner without the data ever leaving the local devices. Federated Learning (FL) has recently emerged as a promising solution to collaborative machine learning challenges while maintaining data privacy. LÄS MER

  5. 10. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Sarmed Almjamai; [2022]
    Nyckelord :Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER