Essays about: "network device identification"
Showing result 1 - 5 of 16 essays containing the words network device identification.
-
1. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE
-
2. Gunshot Detection from Audio Streams in Portable Devices
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Machine learning and artificial neural networks can be used to classify or detect specific sound events in audio signals. Gunshot detection is one use case for such networks and can be used to help law enforcement by alerting officers or triggering camera recordings. READ MORE
-
3. Network Device Enumeration and Identification Using Passive Asset Detection
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : As society strives for an increasing amount of connectivity and digitalization to increase accessibility and productivity, society is also more vulnerable than ever before. Thus, societal, business and personal infrastructure is the most vulnerable it has ever been. READ MORE
-
4. Network Device Enumeration and Identification Using Passive Asset Detection
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : As society strives for an increasing amount of connectivity and digitalization to increase accessibility and productivity, society is also more vulnerable then ever before. Thus, societal, business and personal infrastructure is the most vulnerable it has ever been. READ MORE
-
5. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE