Advanced search

Showing result 1 - 5 of 6 essays matching the above criteria.

  1. 1. Eavesdropping Attacks on Modern-Day Connected Vehicles and Their Ramifications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Afruz Bakhshiyeva; Gabriel Berefelt; [2022]
    Keywords : Connected vehicle; hacking; pentest; eavesdropping; security; Tesla Model 3; Volvo XC40; MG Marvel R; automotive cybersecurity; interception attacks; passive attacks; wireless attacks; Wi-Fi attacks; attack surface; relay attack; port scan; man-in-the-middle attack; Uppkopplade fordon; hacking; avlyssning; säkerhet; Tesla Model 3; Volvo XC40; MG Marvel R; fordonscybersäkerhet; avlyssningsattacker; passiva attacker; trådlösa attacker; Wi-Fi-attacker; attackyta; relä-attack; port-skanning; mannen-i-mitten attack;

    Abstract : Vehicles today are becoming increasingly more connected. Most cars are equipped with Bluetooth, Wi-Fi and Wi-Fi hotspot capabilities and the ability to connect to the internet via a cellular modem. This increase in connectivity opens up new attack surfaces for hackers to exploit. READ MORE

  2. 2. Active- integrated aperture lens antenna

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jesus Ventas Muñoz de Lucas; [2021]
    Keywords : ;

    Abstract : Luneburg lens antennas are gaining popularity in new communication systems, as increasingly higher frequencies are being used. Broadband fully- metallic implementations of Luneburg lenses, such as Rinehart- Luneburg lenses, constitute simple, cheap and efficient beamformers. READ MORE

  3. 3. Training LSTM RNN models for network flow data classification for attack intention recognition systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : James Chilila Antoine; [2020]
    Keywords : ;

    Abstract : The classification of network attack data, and prediction of the next likely set of network traffic flows is of particular interest to the cyber security domain, as it forms the basis for the timely response to cyber attacks as they progress. This work presents an overview of the main Attack Intention Recognition (AIR) approaches and techniques proposed over the last few years and proceeds to propose a system for classifying and distinguishing different types of network attacks using LSTM-RNN models. READ MORE

  4. 4. Reconfigurable Instrument Access Network with a Functional Port Interface

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Gani Kumisbek; Prathamesh Murali; [2019]
    Keywords : IEEE Std. 1687; IJTAG; UART.; Technology and Engineering;

    Abstract : The ever-increasing need for higher performance and more complex functionality pushes the electronics industry to find a faster and more efficient way to test and debug an Integrated Circuit (IC). Currently, the IEEE Std. 1149.1, known as Joint Test Action Group (JTAG) is considered as state of the art by the industry. READ MORE

  5. 5. Evaluation of the CSF Firewall

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Ahmad Mudhar; [2013]
    Keywords : CSF Firewall; Iptables; Firewall; Web server Security; SPI; Configserver Security Firewall; SYN-flood; DoS attack; Port Scan; Exploit checks; Firewall notifications; SSH attacks;

    Abstract : The subject of web server security is vast, and it is becoming bigger as time passes by. Every year, researches, both private and public, are adding to the number of possible threats to the security of web servers, and coming up with possible solutions to them. READ MORE