Essays about: "address randomization"

Found 4 essays containing the words address randomization.

  1. 1. A Study on Fingerprinting of Locally Assigned MAC-Addresses

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Karl-Johan Djervbrant; Andreas Häggström; [2019]
    Keywords : MAC-Address Randomization; Probe Request; Passive Probe Request Analysis; Control Frame Attacks; Computer Science; Network; IEEE 802.11; WiFi; Tracking; Counting.;

    Abstract : The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. READ MORE

  2. 2. Study of neural correlates of attention in mice with spectro-spatio-temporal approaches

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Cantin Ortiz; [2018]
    Keywords : gamma; bursts; neuroscience; attention; mice; LFP; gamma bursts; local field potential; phase randomization; cognition; cognitive process; modulation; spike; neuron; prefrontal cortex; PFC; pre-frontal; tetrode; filtering; Hilbert transform; recordings; oscillation; gamma band;

    Abstract : While signatures of attention can be observed in widespread areas within and outside of cortex, the control of attention is thought to be regulated by higher cognitive brain areas, such as the prefrontal cortex. In their recent study on mice Kim et al. READ MORE

  3. 3. Characterizing WLAN Channel Occupancy for Cognitive Networking

    University essay from KTH/Kommunikationsnät

    Author : Alexandre Vizcaino Luna; [2012]
    Keywords : ;

    Abstract : The deployment of heterogeneous wireless networks in the same spectrum space introduces the need for dynamic spectrum access so as to increase the utilization of the available wireless resources. Dynamic spectrum access needs to be controlled in order avoid interference between the users of different systems. READ MORE

  4. 4. Visualizing Endpoint Security Technologies using Attack Trees

    University essay from Institutionen för datavetenskap

    Author : Stefan Pettersson; [2008]
    Keywords : endpoint security; attack tree; memory corruption; non-executable memory; address randomization; system call interception;

    Abstract : Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. READ MORE