Essays about: "network protocols"
Showing result 31 - 35 of 438 essays containing the words network protocols.
-
31. Decentralized Learning over Wireless Networks with Imperfect and Constrained Communication : To broadcast, or not to broadcast, that is the question!
University essay from Linköpings universitet/KommunikationssystemAbstract : The ever-expanding volume of data generated by network devices such as smartphones, personal computers, and sensors has significantly contributed to the remarkable advancements in artificial intelligence (AI) and machine learning (ML) algorithms. However, effectively processing and learning from this extensive data usually requires substantial computational capabilities centralized in a server. READ MORE
-
32. Honeypot study of threats targeting critical infrastructure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. READ MORE
-
33. Evaluation of communication protocol performance for use in reinforcement learning training in simulation
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Since artificial intelligence (AI) is growing more prominent it is interesting to look at the methods used to train AI. One such method is reinforcement learning in simulation, where AI can train safely in the confines of a simulation. READ MORE
-
34. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
35. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE