Essays about: "fingerprinting"
Showing result 16 - 20 of 69 essays containing the word fingerprinting.
-
16. Walking into the Future : Exploring WiFi fingerprinting in pedestrian-oriented planning
University essay from KTH/TransportplaneringAbstract : In order to investigate what place WiFi fingerprinting has in pedestrian-oriented planning, an interview study was carried out by conducting 12 semi-structured interviews with different actors working in pedestrian-related fields. The actors represent both the private and the public sector, and work in various geographical scales. READ MORE
-
17. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE
-
18. Development and validation of sample clean-up using solid phase extraction prior oil spill fingerprinting
University essay from Linköpings universitet/Institutionen för fysik, kemi och biologiAbstract : In a forensic investigation involving oil, a comparative analysis named oil spill fingerprinting between a source and an oil spill is normally performed. It is based on detecting a certain selection of biomarkers with gas chromatography (GC) coupled to mass spectrometry (MS) which are later divided into diagnostic ratios (DRs). READ MORE
-
19. Natural Fingerprinting of Steel
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : A cornerstone in the industry's ongoing digital revolution, which is sometimes referred to as Industry 4.0, is the ability to trace products not only within the own production line but also throughout the remaining lifetime of the products. READ MORE
-
20. Scanning and Host Fingerprinting Methods for Command and Control Server Detection
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE