Essays about: "Internet Traffic"

Showing result 16 - 20 of 333 essays containing the words Internet Traffic.

  1. 16. The Effect Background Traffic in VPNs has on Website Fingerprinting

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Gustav Rehnholm; [2023]
    Keywords : Website Fingerprinting; Virtual Private Network; Deep Learning; Mönsterigenkänning; Virtuellt Privat Nätverk; Djup Inlärning;

    Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE

  2. 17. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Nadia Charef; [2023]
    Keywords : Reinforcement Learning; Q-learning; Dynamic Energy Management; Energy Sustainabiltiy; IEEE802.15.4 MAC Protocol; Adaptive Duty Cycling; Wireless Sensors Networks; Internet of Things;

    Abstract : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. READ MORE

  3. 18. Cybersecurity Evaluation of an IP Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tova Stroeven; Felix Söderman; [2022]
    Keywords : cybersecurity; IP camera; baby camera; security camera; penetration testing; IoT; Biltema; privacy; ethical hacking;

    Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE

  4. 19. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 20. The Role of Software Engineering in Society 5.0

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Vladana Celebic; [2022]
    Keywords : Society 5.0; Industry 5.0; Software Engineering; Software technologies; Open challenges; Systematic Mapping Study SMS ;

    Abstract : In 2016, the Japanese Council for Science, Technology and Innovation (CSTI) proposed a project about sustainable smart societies known as Society 5.0. Society 5. READ MORE