Essays about: "wireless attacks"

Showing result 1 - 5 of 68 essays containing the words wireless attacks.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  2. 2. Adversarial Machine (Deep) Learning-basedRobustification in 5G Networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mirjalol Aminov; [2023]
    Keywords : 5G; Network Slicing; Adversarial Machine Learning; Machine Learning; Deep Learning;

    Abstract :  A significant development in wireless communication and artificial intelligence has been made possible by the combination of 5G networks with deep learning methods. This paper explores the complex interactions between these areas, concentrating on the dangers that adversarial attacks represent in the context of 5G network slicing. READ MORE

  3. 3. Evaluation of Cyber-Attacks in Networked Control Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Teja Kedar Vadde Hulgesh; [2023]
    Keywords : ;

    Abstract : Networked Control Systems (NCS) form an essential role in numerous critical infrastructures, including water distribution plants, water treatment plants, electric power grids, and power transmission networks. NCS employ a communication network to share data between the plant and the controller. READ MORE

  4. 4. Assessing the threat of Stingrays in 4G cellular networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Emil Karim; Sina Khoraman; [2023]
    Keywords : Cellular network; Wireless communication; Stingray; Privacy; Surveillance; Tracking; 4G; Software-defined radio; Cellulärt nätverk; Trådlös kommunikation; Stingray; Integritet; Övervakning; Spårning; 4G; Mjukvarudefinierad radio;

    Abstract : This bachelor thesis explores the threat of Stingrays, fake cell towers, to the mobile network. The increasing availability of open-source technology and hardware has made it easier to build Stingrays. READ MORE

  5. 5. Secure satellite internet usage in high-risk areas

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Andreas Kvant; Carl Johansson; [2023]
    Keywords : satellite internet; high-risk area; threats; risks; mitigations; satellit internet; högriskområden; hot; risker; åtgärder;

    Abstract : Background. In high-risk areas, a reliable and secure internet connection is not always guaranteed. READ MORE