Sökning: "address randomization"

Hittade 4 uppsatser innehållade orden address randomization.

  1. 1. A Study on Fingerprinting of Locally Assigned MAC-Addresses

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Karl-Johan Djervbrant; Andreas Häggström; [2019]
    Nyckelord :MAC-Address Randomization; Probe Request; Passive Probe Request Analysis; Control Frame Attacks; Computer Science; Network; IEEE 802.11; WiFi; Tracking; Counting.;

    Sammanfattning : The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. LÄS MER

  2. 2. Study of neural correlates of attention in mice with spectro-spatio-temporal approaches

    Uppsats för yrkesexamina på avancerad nivå, KTH/Skolan för datavetenskap och kommunikation (CSC)

    Författare :Cantin Ortiz; [2018]
    Nyckelord :gamma; bursts; neuroscience; attention; mice; LFP; gamma bursts; local field potential; phase randomization; cognition; cognitive process; modulation; spike; neuron; prefrontal cortex; PFC; pre-frontal; tetrode; filtering; Hilbert transform; recordings; oscillation; gamma band;

    Sammanfattning : While signatures of attention can be observed in widespread areas within and outside of cortex, the control of attention is thought to be regulated by higher cognitive brain areas, such as the prefrontal cortex. In their recent study on mice Kim et al. LÄS MER

  3. 3. Characterizing WLAN Channel Occupancy for Cognitive Networking

    Master-uppsats, KTH/Kommunikationsnät

    Författare :Alexandre Vizcaino Luna; [2012]
    Nyckelord :;

    Sammanfattning : The deployment of heterogeneous wireless networks in the same spectrum space introduces the need for dynamic spectrum access so as to increase the utilization of the available wireless resources. Dynamic spectrum access needs to be controlled in order avoid interference between the users of different systems. LÄS MER

  4. 4. Visualizing Endpoint Security Technologies using Attack Trees

    Master-uppsats, Institutionen för datavetenskap

    Författare :Stefan Pettersson; [2008]
    Nyckelord :endpoint security; attack tree; memory corruption; non-executable memory; address randomization; system call interception;

    Sammanfattning : Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. LÄS MER