Essays about: "security mac"
Showing result 1 - 5 of 15 essays containing the words security mac.
-
1. Analysis of the security of a VXLAN network
University essay from KTH/Hälsoinformatik och logistikAbstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE
-
2. Integrating Jamming Detection into Low-power Mesh Networks
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In the field of the Internet of Things (IoT), jamming attacks and anti-jamming countermeasures have always been a very important research directions. Jamming attacks are aimed at disturbing routine wireless communications by sending out intentional radio interference, which leads to packet loss, higher energy consumption, and even disruption of the whole network. READ MORE
-
3. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
4. Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. READ MORE
-
5. Evaluation of Cryptographic CRC in 65nm CMOS
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconnected to provide various services appealing to users. Many devices will get an access to valuable information which is likely to increase the number of malicious attacks on these devices in the future. READ MORE