Essays about: "network protocols"

Showing result 31 - 35 of 438 essays containing the words network protocols.

  1. 31. Decentralized Learning over Wireless Networks with Imperfect and Constrained Communication : To broadcast, or not to broadcast, that is the question!

    University essay from Linköpings universitet/Kommunikationssystem

    Author : Martin Dahl; [2023]
    Keywords : Decentralized Stochastic Gradient Descent; Decentralized Learning; Medium Access Control; Wireless Communications; Machine Learning; Imperfect Communication; Resource-Constrained; Resource Allocation; Scheduling;

    Abstract : The ever-expanding volume of data generated by network devices such as smartphones, personal computers, and sensors has significantly contributed to the remarkable advancements in artificial intelligence (AI) and machine learning (ML) algorithms. However, effectively processing and learning from this extensive data usually requires substantial computational capabilities centralized in a server. READ MORE

  2. 32. Honeypot study of threats targeting critical infrastructure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlo Alberto Scola; [2023]
    Keywords : ICS; Honeypots; Modbus; SCADA; Enip; Conpot; Bacnet; FTP; IPMI; Network security; Cyber attacks;

    Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE

  3. 33. Evaluation of communication protocol performance for use in reinforcement learning training in simulation

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Leo Wiklund; [2022]
    Keywords : reinforcement learning; network communication; communication protocols; communication performance;

    Abstract : Since artificial intelligence (AI) is growing more prominent it is interesting to look at the methods used to train AI. One such method is reinforcement learning in simulation, where AI can train safely in the confines of a simulation. READ MORE

  4. 34. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 35. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Ellebrink; [2022]
    Keywords : Messaging protocol; Decentralized; Blockchain; Smart contract; Internet computer; Dfinity; Meddelandeprotokoll; Decentraliserad; Blockkedja; Smarta kontrakt; Internet computer; Dfinity;

    Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE