LANDEKER, DAVID
V sodobnih časih naše okolje vsebuje številne manjše naprave, ki opravljajo različne funkcije. Veliko takih naprav ne vsebuje zaslona ali tipkovnic, saj za izvajanje niso potrebni. Njihov priklop je običajno preprost, saj pogosto potrebujejo samo vir napajanja. Za delovanje takih naprav v lokalnem brezžičnem omrežju pa potrebujemo metodo posredovan...
GABERŠČEK, EVA
Diplomska naloga obravnava učinkovitost protokola WPA3. To je najnovejši varnostni algoritem za zaščito brezžične komunikacije. Zanima nas, kako se ta algoritem obnese v praksi ter kako se je z njegovim razvojem izboljšala varnost brezžične komunikacije. V prvem delu je napisan pregled predhodnih protokolov, to so WEP, WPA ter WPA2. Predstavi njiho...
tanwar, jaswinder kumar, tajinder mohamed, ahmed a. sharma, purushottam lalar, sachin keshta, ismail garg, vishal
This paper explains the project’s objectives, identifies the key stakeholders, defines the project manager’s authority and provides a preliminary breakdown of roles and responsibilities. For the project’s future, it acts as a source of authority. This paper’s objective is to record the justifications for starting the project, its goals, limitations...
BRINGHENTI, DANIELE
L'abstract è presente nell'allegato / the abstract is in the attachment
Yu, Yingle
Published in
Open Computer Science
With the rapid development and progress of big data technology, people can already use big data to judge the transmission and distribution of network information and make better decisions in time, but it also faces major network threats such as Trojan horses and viruses. Traditional network security functions generally wait until the network power ...
Li, Chunqiu
Published in
Nonlinear Engineering
In order to solve the problem of recursion equation in network security, the author proposes an application of network security risk detection. The search efficiency of the artificial intelligence planning algorithm is better than the traditional attack graph generation method, designed and implemented a planning engine for security risk assessment...
Sateesan, Arish; 129240; Vliegen, Jo; 62510; Daemen, Joan; Mentens, Nele; 43861;
This paper optimizes Bloom filter algorithms and hardware architectures for high-speed implementation on FPGAs. A Bloom filter is a data structure that is used to check whether input search data are present in a table of stored data. Bloom filters are extensively used for monitoring network traffic. Improving the speed of Bloom filters can therefor...
Chen, Chien-Ming Chen, Zhaoting Kumari, Saru Lin, Meng-Chang
Published in
Sensors (Basel, Switzerland)
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors are used to collect patient health data, and information is transmitted remotely to doctors who can develop accurate treatment plans and provide timely telemedicine se...
Rastogi, Prasansha Venner, Cornelis H Visser, Claas Willem
Published in
Polymers
Direct Bubble Writing is a recent technique to print shape-stable 3-dimensional foams from streams of liquid bubbles. These bubbles are ejected from a core-shell nozzle, deposited on the build platform placed at a distance of approximately 10 cm below the nozzle, and photo-polymerized in situ. The bubbles are ejected diagonally, with a vertical vel...
Huč, Aleks
Communication is essential to humans as social beings - it enables us to build and maintain relationships, take part in education, work and act in other private and public social environments settings. Nowadays, more and more communication is occurring through computers, computer networks and other digital devices. Unfortunately, as with many thing...