Essays about: "Man-in"
Showing result 11 - 15 of 81 essays containing the word Man-in.
-
11. Worlding Communication: The Foregrounding of Novel Communication Barriers in Literature
University essay from Stockholms universitet/Engelska institutionenAbstract : Novel communication barriers, innovative obstacles to mutual understanding that deviate from the norms of the actual world, are a recurring yet understudied presence in aesthetic worlds of all kinds. Some examples of this are Dana’s twentieth-century way of speaking that travels back in time with her in Kindred, or Americans under Japanese occupation struggling to speak through cultural and linguistic barriers in an alternate historical timeline in The Man in the High Castle, or the unique obstructions to communication in the alien encounters of Ursula Le Guin’s The Left Hand of Darkness or Ted Chiang’s “The Story of Your Life. READ MORE
-
12. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
13. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE
-
14. Ethical hacking of a premium robot vacuum : Penetration testing of the Roborock S7 robot vacuum cleaner
University essay from KTH/Hälsoinformatik och logistikAbstract : With the advancements made in the field of data science, smart IoT devices are be-coming increasingly common. Consequently, this creates an increased number of targets for hackers to potentially exploit. This is a study about ethically hacking a robot vacuum, the Roborock S7, and evaluating the security of the target system. READ MORE
-
15. Security Analysis of OPC UA in Automation Systems for IIoT
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. READ MORE