• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 155
  • 72
  • 51
  • 45
  • 14
  • 8
  • 7
  • 6
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 436
  • 293
  • 78
  • 61
  • 48
  • 47
  • 47
  • 43
  • 42
  • 37
  • 37
  • 35
  • 32
  • 32
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

Customer Driven Improvements of Home Network and Router / Kunddrivna förbättringar av hemnätverk och router

Rylander, Lina, Sandberg, Hilda January 2015 (has links)
This thesis is a service design project that has been carried out in cooperation with the telecom company Telia Sweden (belonging to TeliaSonera AB). The purpose of the report was to examine Telia's fixed broadband service for private customers from a customer perspective. Previously, the service has mainly been developed from a technology-driven perspective. During the broadband subscription, the customers are able to borrow a router from Telia but it has been noticed that some customers opt out Telia’s router. The objective of this work has been to deliver useful customer insights and improvement proposals to Telia within the framework of the broadband service. In the project, a service design methodology was used where the focus has been on interactions with customers. The interactions consisted of in-depth qualitative interviews. The project consisted of five phases. An initial preparation phase with a literature study on service design methods, the Internet and broadband technology as well as learning about and understanding the company. During the preparation phase internal hypotheses about the service problem areas were collected. The initial phase was followed by three iterative loops with customer interactions, insight analysis, ideation and conceptualization. Customer insights and concepts have been tested, evaluated, and deepened during the project. In the last phase the result was processed and the insights were rated for easier implementation. A major problem area for many customers was the Wi-Fi and Wi-Fi range, because the technology is perceived as difficult and abstract. The conclusion is that Telia should help their clients to improve the Wi-Fi quality and the project work led to three ultimate concepts tested on customers. Also six recommendations were delivered to Telia. / Detta examensarbete är ett tjänstedesignprojekt som har utförts i samarbete med telekombolaget Telia Sverige (tillhörande TeliaSonera AB). Syftet med rapporten har varit att undersöka Telias fasta bredbandstjänst för privatpersoner ur ett kundperspektiv. Tidigare har tjänsten främst utvecklats utifrån ett teknikdrivet perspektiv. Under tiden som bredbandskund hos Telia får kunden låna en router men Telia har märkt att en del kunder väljer bort routern. Målet för arbetet har varit att leverera användbara kundinsikter och koncept på förbättringsförslag till Telia inom ramen för bredbandstjänsten. I projektet har en tjänstedesignmetodik använts där fokus har legat på interaktioner med kunderna. Interaktionerna har bestått av djupgående kvalitativa intervjuer. Projektet har bestått av fem faser. En inledande förberedande fas med förstudie om bland annat tjänstedesignmetoder, internet och bredbandstekniken, samt tid för att lära känna och förstå företaget. Under den förberedande fasen samlades även interna hypoteser om tjänstens problemområden in. Den inledande fasen följdes av tre iterativa loopar med kundinteraktioner, insiktsanalys, idégenerering och konceptualisering. Kundinsikter och koncept har testats, utvärderats och fördjupats under projektets gång. I den sista fasen bearbetades och rangordnades resultatet för att insikterna lättare ska kunna implementeras på företaget. Ett stort problemområde för många kunder var Wi-Fi och Wi-Fi-täckningen, då tekniken upplevs som svår och abstrakt. Slutsatsen är att Telia borde hjälpa sina kunder att själva förbättra Wi-Fikvalitén och arbetet ledde fram till tre slutgiltiga koncept som testades på kunder och utvärderades. Även sex rekommendationer till Telia levererades.
312

En summering av mitigeringsförslag gällande laglösa accesspunkter i publika Wi-Fi nätverk : Ett förslag gällande riktlinjer för att assistera vid val av publik Wi-Fi nätverkssäkerhet / A summary regarding mitigation proposals of rouge access points in public Wi-Fi networks : A proposal to guidelines for assisting in choice of public Wi-Fi network security

Sandberg, Johannes January 2020 (has links)
På grund av populariteten utav trådlösa nätverk och dess ökade hot av laglösa accesspunkter krävs lösningar för upptäckt, undvikande samt motverkan att upplysas. Det existerar många olika tekniker men det finns ingen gyllene regel för vad som är mest passande för olika scenarier eller nätverksmiljöer. Specifikt så är detta otydligt i publika Wi-Fi nätverk. Syftet med denna studie var att primärt hitta olika tillvägagångssätt som en laglös accesspunkt kan upptäckas, undvikas och motverkas. Men även hur en nätverksadministratör eller dylikt ska gå tillväga för att välja just den lösningen som anses mest passande för dess scenario. För att besvara detta skapades ett ramverk som tydligt ger hänvisningar till en nätverksadministratör. Ramverket baseras på fördelar och nackdelar utav olika tillvägagångssätt medan det hänvisar till olika tillvägagångsval baserade på vad som eftersöks. Sådana faktorer kan vara säkerhet, användbarhet eller utplacering.Studien är baserad efter en systematisk litteraturstudie, som använde tre databaser för att samla in information. De databaser som användes i studien var ACM Digital Library, IEEExplorer och ScienceDirect. Genom att nyttja dessa databaser med specifikt formade söktermer kunde en stor mängd artiklar förvärvas. Därefter kunde artiklar delas in i olika teman med tematisk kodning, beroende på innehållet av varje artikel. Avslutningsvis hade studien 37 godkända artiklar med 4 identifierade teman som sammankopplar 13 kategorier. Genom dessa teman och dess innehåll utformades ett ramverk som utifrån olika val vägleder till passande lösningar.
313

Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach

Horne, Liliana R. 01 January 2018 (has links)
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet access and providers draw new prospective customers. While users are able to enjoy the ease of Wi-Fi Internet hotspot networks in public more conveniently, they are more susceptible to a particular type of fraud and identify theft, referred to as evil twin attack (ETA). Through setting up an ETA, an attacker can intercept sensitive data such as passwords or credit card information by snooping into the communication links. Since the objective of free open (unencrypted) public Wi-Fi hotspots is to provide ease of accessibility and to entice customers, no security mechanisms are in place. The public’s lack of awareness of the security threat posed by free open public Wi-Fi hotspots makes this problem even more heinous. Client-side systems to help wireless users detect and protect themselves from evil twin attacks in public Wi-Fi hotspots are in great need. In this dissertation report, the author explored the problem of the need for client-side detection systems that will allow wireless users to help protect their data from evil twin attacks while using free open public Wi-Fi. The client-side evil twin attack detection system constructed as part of this dissertation linked the gap between the need for wireless security in free open public Wi-Fi hotspots and limitations in existing client-side evil twin attack detection solutions. Based on design science research (DSR) literature, Hevner’s seven guidelines of DSR, Peffer’s design science research methodology (DSRM), Gregor’s IS design theory, and Hossen & Wenyuan’s (2014) study evaluation methodology, the author developed design principles, procedures and specifications to guide the construction, implementation, and evaluation of a prototype client-side evil twin attack detection artifact. The client-side evil twin attack detection system was evaluated in a hotel public Wi-Fi environment. The goal of this research was to develop a more effective, efficient, and practical client-side detection system for wireless users to independently detect and protect themselves from mobile evil twin attacks while using free open public Wi-Fi hotspots. The experimental results showed that client-side evil twin attack detection system can effectively detect and protect users from mobile evil twin AP attacks in public Wi-Fi hotspots in various real-world scenarios despite time delay caused by many factors.
314

Využití PDA pro distribuci informací v rámci uzavřených sítí / PDA for Information Distribution in Closed Networks

Maslaňák, Martin Unknown Date (has links)
This thesis deals with creating client - server application. Client part of the application is created with a help of the Compact .NET framework and it is running on the mobile facility (PDA). Server part is written on .NET framework and it is running on the desktop computer. In the first part I characterize PDA facility, it's using and also I discuss communication between SQL Servers and PDA facilities. Next part describes .NET platform and advantages, which this platform provides. Also I tried to show differences between client - server architectures, because of understanding in my working. The last part of this work deals with implementation of the client - server application.
315

BLUETOOTH-ENABLED ENERGY MONITORING SYSTEM WITH WIRELESS DATA ACQUISITION USING WEB SERVER

Waikul, Devendra Mahendra 07 September 2020 (has links)
No description available.
316

"Death Date"

Perez, Andrea C. 05 1900 (has links)
This project consists of a union between sci-fi, magic, and realism. Using magic in the same contexts of realism is to make a legend come to life in our modern world. All three stories deal with difficult situations: the struggle of creation and insecurities, the struggle of suicide and overcoming traumatic experiences, the struggle of disabilities and disadvantages and turning it into strength. These topics are introduced through characters who find themselves coming up with solutions through fantastical means as outlets for their pain. In "She Who Fell in Love with the Sky and Sea," an artist and an unlikely mythical muse come together to create the best art the world has ever seen, yet the art becomes unclaimable to the artist at the twisted eyes of her muse. In "Death Date," death has visited Sola through a psychic prediction arriving with perfect timing. She is given one year to live. Struggling with a traumatic past, her death date encourages Sola to live out the rest of her days and stop her original plans. The Switch explores the conditions of living in dystopian lands with a neighboring land that is a utopia. This novel explores the life of Sain as he uncovers the mysterious disappearances of his fellow townspeople. On his journey, he discovers more than he wanted to know. Diving deeper into the governing rule of the Regime, Sain finds himself as a savior for not only his people but for the hidden people within the border. Sain, starting off weaker than most due to his father's negligence, must advance his axum, a power flowing within everyone at birth, and reduce the Regime to what it once was to reclaim what rightfully belongs to his people.
317

Denial-of-service attacks against the Parrot ANAFI drone / DoS- attacker mot drönaren Parrot ANAFI.

Feng, Jesse, Tornert, Joakim January 2021 (has links)
As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. Some drones use Wi-Fi technology for communication, such as the Parrot ANAFI, which introduces many of the same security threats that are frequently found in general IoT. Therefore, this report covers a common group of cyberattacks, known as denial-of-service attacks, their effects on the Parrot ANAFI, and their ease of use. A threat model was created to have an overview of the system architecture, and all of the identified threats were assessed using DREAD. All of the software tools used in this report can be found for free on the Internet using search engines and simple key words. The results showed that the drone is generally secure, but it is vulnerable to a certain denial-of-service attack, which can open the door to multiple attack surfaces if the password for the drone’s Wi-Fi is not strong enough. Some suggestions for mitigating these threats are presented at the end of the report. / I takt med att IoT-marknaden fortsätter att växa ökar också behovet av säker trådlös kommunikation. Drönare har blivit en populär pryl bland såväl privatpersoner som diverse industrier under det senaste decenniet, och populariteten fortsätter att växa. Vissa drönare använder Wi-Fi-teknik för kommunikation, till exempel Parrot ANAFI, vilket introducerar många av de säkerhetshot som ofta existerar bland IoT i allmänhet. Den här rapporten täcker därför en välkänd grupp av cyberattacker, som kallas denial-of-service-attacker, deras effekter på Parrot ANAFI och deras användarvänlighet. En hotmodell skapades för att ha en överblick över systemarkitekturen och alla identifierade hot rangordnades med hjälp av DREAD. Alla programvaruverktyg som används i denna rapport kan hittas gratis på Internet med hjälp av enkla sökningar på nyckelord. Resultaten påvisar att drönaren i allmänhet är säker, men att den är sårbar för en viss typ av denial-of-service-attack, vilket kan öppna dörren till flera attackytor om lösenordet för drönarens Wi-Fi inte är tillräckligt starkt. Några förslag för att mildra dessa hot presenteras i slutet av rapporten.
318

A Low-Cost Omnidirectional Antenna for Wi-Fi Access Points

McGough, Erin Patrick 05 June 2014 (has links)
No description available.
319

Unobtrusive, Pervasive, and Cost-Effective Communications with Mobile Devices

Champion, Adam C. 25 September 2017 (has links)
No description available.
320

Baer and quasi-baer modules

Roman, Cosmin Stefan 29 September 2004 (has links)
No description available.

Page generated in 0.0515 seconds