Essays about: "Active Probing"
Showing result 1 - 5 of 19 essays containing the words Active Probing.
-
1. THE SHIFTING DYNAMICS BETWEEN WORK AND LIFE IN REMOTE WORKING
University essay from Göteborgs universitet/Institutionen för pedagogik, kommunikation och lärandeAbstract : Purpose: Aiming to investigate how knowledge workers organise their work through boundary practice in remote working, this study has partnered with one online consulting company who provides professional accounting services to third party customers. This study tries to explore 1) how accountants organize their work through managing and shaping their physical and temporal boundaries to establish flexibility in remote working; 2) how are technologies harnessed to manage work-life boundaries in the context of remote working. READ MORE
-
2. Legacy effects of temperature alterations on microbial resistance and resilience to drying and rewetting
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : With warming in soils due to climate change, a series of secondary factors arise, which have multifaceted effects on soil microbial communities. Of these, alterations to soil moisture are among the most crucial to understanding how microbial functions will change in the face of climate change. READ MORE
-
3. Heterogeneous catalytic reactions studied with transient gas supply and event-averaged ambient pressure x-ray photoelectron spectroscopy
University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/NanoLund: Centre for NanoscienceAbstract : CO oxidation over Pd(100) is studied with ambient pressure x-ray photoelectron spectroscopy (APXPS). Cyclic gas composition pulsing of the CO:O2 ratio, combined with a new method using software based event-averaging by image recognition over many pulses, is used to improve the signal-to-noise ratio substantially. READ MORE
-
4. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE
-
5. Scanning and Host Fingerprinting Methods for Command and Control Server Detection
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE