Essays about: "network probing"

Showing result 1 - 5 of 17 essays containing the words network probing.

  1. 1. Estimation of Parabolic Microwave Antenna Movements Using Sensor Fusion

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Nikhil Challa; [2023]
    Keywords : Technology and Engineering;

    Abstract : Wireless communication has seamlessly integrated itself into our daily lives, with Ericsson pioneering the development of comprehensive mobile ecosystems. As the demand for data traffic continues to surge, the enhancement of both cellular radio systems and backhaul infrastructure remains paramount. READ MORE

  2. 2. Generic Encrypted Traffic Identification using Network Grammar : A Case Study in Passive OS Fingerprinting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Lukas Rajala; Kevin Scott; [2022]
    Keywords : Passive OS Fingerprinting; Encrypted Traffic Identification; Automated Traffic Analysis; Machine Learning; Supervised Learning; Networks; Packet Classification; Security and Privacy;

    Abstract : The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attacking vulnerable devices on government or private company networks. The devices attacked are often forgotten computers that run operating systems with known exploits. READ MORE

  3. 3. Diagnostics Framework for Time-Critical Control Systems in Cloud-Fog Automation

    University essay from Mälardalens universitet/Inbyggda system

    Author : Johannes Deivard; Valentin Johansson; [2022]
    Keywords : Cloud-fog automation; distributed control systems; network diagnostics; process diagnostics; process mining; Industrial Internet of Things; Industry 4.0; network probing; wireless telecommunication; 5G; WiFi 6; eBPF;

    Abstract : Evolving technology in wireless telecommunication, such as 5G, provides opportunities to utilize wireless communication more in an industrial setting where reliability and predictability are of great concern. More capable Industrial Internet of Things devices (IIoT) are, indeed, a catalyst for Industry 4.0. READ MORE

  4. 4. Scanning and Host Fingerprinting Methods for Command and Control Server Detection

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yuki Nakamura; Björn Åström; [2021]
    Keywords : command and control; C2; CnC; botnet; scanning; probing;

    Abstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE

  5. 5. Targeting the epigenetic state of refractory and relapsing acute myeloid leukaemia

    University essay from Högskolan i Skövde/Institutionen för biovetenskap

    Author : Ojong Tabi Ojong Besong; [2021]
    Keywords : ;

    Abstract : Acute myeloid leukaemia (AML) is a heterogeneous group of myeloid lineage malignancies arising from a spectrum of mutations. AML is characterized by the uncontrolled proliferation of clonal cells, which are unable to properly differentiate into mature myeloid cells. READ MORE