Essays about: "wireless attacks"
Showing result 1 - 5 of 68 essays containing the words wireless attacks.
-
1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
2. Adversarial Machine (Deep) Learning-basedRobustification in 5G Networks
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : A significant development in wireless communication and artificial intelligence has been made possible by the combination of 5G networks with deep learning methods. This paper explores the complex interactions between these areas, concentrating on the dangers that adversarial attacks represent in the context of 5G network slicing. READ MORE
-
3. Evaluation of Cyber-Attacks in Networked Control Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Networked Control Systems (NCS) form an essential role in numerous critical infrastructures, including water distribution plants, water treatment plants, electric power grids, and power transmission networks. NCS employ a communication network to share data between the plant and the controller. READ MORE
-
4. Assessing the threat of Stingrays in 4G cellular networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This bachelor thesis explores the threat of Stingrays, fake cell towers, to the mobile network. The increasing availability of open-source technology and hardware has made it easier to build Stingrays. READ MORE
-
5. Secure satellite internet usage in high-risk areas
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE
