Essays about: "countermeasures"
Showing result 6 - 10 of 172 essays containing the word countermeasures.
-
6. Business as usual? : Third-country business and legal effects of sanctions on international trade
University essay from Uppsala universitet/Företagsekonomiska institutionenAbstract : This thesis explores the legal implications of sanctions on third country companies trading or operating with a sanctioned target state. Considering previous research – primarily from the disciplines of international business, international commercial law and economics – into international business under conditions of sanctions, we analyze the interplay of different sanctions and how they affect third country business. READ MORE
-
7. Adversarial Machine (Deep) Learning-basedRobustification in 5G Networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : A significant development in wireless communication and artificial intelligence has been made possible by the combination of 5G networks with deep learning methods. This paper explores the complex interactions between these areas, concentrating on the dangers that adversarial attacks represent in the context of 5G network slicing. READ MORE
-
8. Evaluation of FMCW Radar Jamming Sensitivity
University essay from Uppsala universitet/Signaler och systemAbstract : In this work, the interference sensitivity of an FMCW radar has been evaluated by studying the impact on a simulated detection chain. A commercially available FMCW radar was first characterized and its properties then laid the foundation for a simulation model implemented in Matlab. READ MORE
-
9. Classification of Radar Emitters using Semi-Supervised Contrastive Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Radar is a commonly used radio equipment in military and civilian settings for discovering and locating foreign objects. In a military context, pilots being discovered by radar could have fatal consequences. READ MORE
-
10. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE