Essays about: "Attack simulation"

Showing result 1 - 5 of 51 essays containing the words Attack simulation.

  1. 1. Evaluation of FMCW Radar Jamming Sensitivity

    University essay from Uppsala universitet/Signaler och system

    Author : Ludvig Snihs; [2023]
    Keywords : FMCW; FMCW radar; radar; frequency-modulated radar; noise jamming; frequency-modulated continuous wave radar; FMCW Jamming; Jamming; Pulse Train; Pulse Jamming; Spoofing Attack; Spoofing; Deception; Repeater Jamming; Repeater; Automotive Radar; CFAR; sensor jamming; constant false alarm rate; electronic warfare; EW; FMCW; FMCW radar; frekvensmodulerad dopplerradar; dopplerradar; radar; brusstörning; radarstörning; pulsstörning; pulståg; falskmål; vilseledning; repeterstörning; bilradar; sensorstörning; CFAR;

    Abstract : In this work, the interference sensitivity of an FMCW radar has been evaluated by studying the impact on a simulated detection chain. A commercially available FMCW radar was first characterized and its properties then laid the foundation for a simulation model implemented in Matlab. READ MORE

  2. 2. Analysis of the security of a VXLAN network

    University essay from KTH/Hälsoinformatik och logistik

    Author : Markus Rehnberg; Erik Ekblad; [2023]
    Keywords : VXLAN; VLAN; security; networking; cloud-computing; VXLAN; VLAN; säkerhet; nätverk; molntjänster;

    Abstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE

  3. 3. Airspeed estimation of aircraft using two different models and nonlinear observers

    University essay from Linköpings universitet/Fordonssystem

    Author : Alexander Roser; Anton Thunberg; [2023]
    Keywords : sensor fusion; flight mechanics; Kalman filter; extended Kalman filter; unscented Kalman filter; pitot tube; airspeed estimation; simulation;

    Abstract : When operating an aircraft, inaccurate measurements can have devastating consequences. For example, when measuring airspeed using a pitot tube, icing effects and other faults can result in erroneous measurements. READ MORE

  4. 4. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  5. 5. Active flow control of the turbulent boundary layer over a NACA4412 wing profile for skin friction drag reduction

    University essay from KTH/Teknisk mekanik

    Author : Giacomo Semprini Cesari; [2023]
    Keywords : Active flow control; drag reduction; numerical simulations; turbulent boundary layer; wings;

    Abstract : In the context of building a framework for active flow control of turbulent boundary layers in wings, a set of large-eddy simulation (LES) are implemented in OpenFOAM. The flow around a NACA4412 wing profile is simulated at 5° angle of attack and Re_c = 400˙000. READ MORE