• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 1
  • Tagged with
  • 7
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Bezpečnostní analýza bezdrátových sítí / Wireless networks security analysis

Szőcs, Juraj January 2010 (has links)
This master’s thesis deals with analysis of security in wireless networks. There are desc- ribed various methods of security systems, such as WEP, TKIP and CCMP. There is also realization of attacks against the wireless network and there is analysis of security weaknesses. Then there are discussed possible defense mechanisms. Part of this work was also analysis of local security in certain areas and evaluation of their security.
2

Visual Programming with the Unreal Development Kit

Wilhelmsson, Patrik January 2013 (has links)
This thesis discusses the differences of programming with the Unreal Engine 3’s visual scripting tool Kismet versus traditional programming. A simple action adventure game was developed with the Unreal Development Kit (UDK) in order to gain experience with the tool. UDK is the free version of Epic Games’ game engine Unreal Engine 3. The resulting game has a mixture of a third person behind the character default camera and fixed camera angles. The gameplay is simple; the playable character can run, investigate the level, shoot and lift and push objects. The game focused on exploration and puzzle solving. The writer found programming with Kismet to be easy to get into and highly useful. It was preferred over traditional programming for beginners. The same principles of planning ahead before writing code applied even to visual programming. It was concluded that good structure to the code was very important for larger sequences in order to have readable code. For complex gameplay classes the Unreal Engine 3’s own programming language UnrealScript was preferred. The resulting opinions of programming with a visual language are of highly subjective nature and suggestions for further studies were given.
3

Utvärdering av site survey-mjukvara : En jämförelse av två verktyg

Calson, Gustav January 2009 (has links)
Denna rapport jämför ett kommersiellt site survey-verktyg med ett open sourcealternativ. En site survey är processen att planera och implementera ett trådlöstnätverk. Det är viktigt för att undvika problem med täckning, störningar samtplacering och konfigurering av accesspunkter. För att göra jämförelsen har en metod utvecklats för att jämföra site survey-verktyg. Metoden tar upp och jämför olika kriterier i form av verktygens förmåga att hantera signalstyrka, störningar, quality of service, manuella site surveys, virtuella site surveys, dokumentering av resultat samt verktygens förmåga att underlätta vid placering och konfigurering av accesspunkter. Förutom detta tas även mjukvarornas gränssnitt och användarvänlighet upp. Metoden skulle dock kunna utökas ytterligare för att innefatta t ex säkerhet, inlärningstid och support, för att på så sätt bidra till en bättre jämförelse.De verktyg som har jämförts är open source-mjukvaran Kismet och den kommersiella mjukvaran InterpretAir. InterpretAir har visat sig ha en bättre funktionalitet på alla punkter och anses därför vara den mest lämpliga mjukvaran vid en site survey. Detta kan dock ha berott på att Kismet, trots att det utsetts till det lämpligaste open sourcealternativet, inte är ett renodlat site survey-verktyg och därför inte har samma fokus på just denna funktionalitet.
4

Utvärdering av site survey-mjukvara : En jämförelse av två verktyg

Calson, Gustav January 2009 (has links)
<p>Denna rapport jämför ett kommersiellt site survey-verktyg med ett open sourcealternativ.</p><p>En site survey är processen att planera och implementera ett trådlöstnätverk. Det är viktigt för att undvika problem med täckning, störningar samtplacering och konfigurering av accesspunkter.</p><p>För att göra jämförelsen har en metod utvecklats för att jämföra site survey-verktyg. Metoden tar upp och jämför olika kriterier i form av verktygens förmåga att hantera signalstyrka, störningar, quality of service, manuella site surveys, virtuella site surveys, dokumentering av resultat samt verktygens förmåga att underlätta vid placering och konfigurering av accesspunkter. Förutom detta tas även mjukvarornas gränssnitt och användarvänlighet upp. Metoden skulle dock kunna utökas ytterligare för att innefatta t ex säkerhet, inlärningstid och support, för att på så sätt bidra till en bättre jämförelse.De verktyg som har jämförts är open source-mjukvaran Kismet och den kommersiella mjukvaran InterpretAir.</p><p>InterpretAir har visat sig ha en bättre funktionalitet på alla punkter och anses därför vara den mest lämpliga mjukvaran vid en site survey. Detta kan dock ha berott på att Kismet, trots att det utsetts till det lämpligaste open sourcealternativet, inte är ett renodlat site survey-verktyg och därför inte har samma fokus på just denna funktionalitet.</p>
5

Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.

Ekhator, Stephen January 2010 (has links)
ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. In fact the security problems and solution of information systems are becoming more and more complex and complicated as new exploit security tools like Kismet and Netsh (a NetStumbler alternative) are developed. This thesis work tried to look at the passive detection of wireless network capability of kismet and how it function and comparing it with the default windows network shell ability to also detect networks wirelessly and how vulnerable they make secured and non-secured wireless network. Further analysis where made on captured network source packets using wireshark (a network analyzer). The discovery of MAC addresses, IP address, data frames, SSID’s by kismet and netsh and the further exposure of management traffic with wireshark is a source of concern given that such useful network parameters in the hands of an experienced hacker would be a valuable information that could be used in hacking into any network computer. Introduction to kismet and netstumbler application and their inherent capabilities in network detection is given an in depth look at the beginning of this work. A wide range of definitions and concepts of wireless technology application and uses as it applies to wireless networks, supported devices, security standards and protocols, firewalls and ad-hoc networks, wardriving and its legality, types of authentication, the Linux kernel, special TCP/UDP ports, the drone and third party firmware were all given an in depth look. kismet download and configurations on linux based OS and the netsh utility fucntionalities was explained for the purpose of clarity. Captured management data packets were opened with wireshark and management data frames found within the packets were analysed. Also, a look at the different file types and results of captured management traffic were displayed. Some of the challenges encountered in the course of this work were discoursed in details and comparison between kismet and netsh was done from the perspective of the vulnerability of a network and the poor channel hopping capability of kismet. / The thesis is about deploying Kismet application software to capture wireless networks, analysis the capture data packets if there is any vulnerability and then compare the results with NETSH captures . NETSH is a Netstumbler alternative which comes as default in Windows vista.
6

Development and Integration of a Low-Cost Occupancy Monitoring System

Mahjoub, Youssif 12 1900 (has links)
The world is getting busier and more crowded each year. Due to this fact resources such as public transport, available energy, and usable space are becoming congested and require vast amounts of logistical support. As of February 2018, nearly 95% of Americans own a mobile cell phone according to the Pew Research Center. These devices are consistently broadcasting their presents to other devices. By leveraging this data to provide occupational awareness of high traffic areas such as public transit stops, buildings, etc logistic efforts can be streamline to best suit the dynamics of the population. With the rise of The Internet of Things, a scalable low-cost occupancy monitoring system can be deployed to collect this broadcasted data and present it to logistics in real time. Simple IoT devices such as the Raspberry Pi, wireless cards capable of passive monitoring, and the utilization of specialized software can provide this capability. Additionally, this combination of hardware and software can be integrated in a way to be as simple as a typical plug and play set up making system deployment quick and easy. This effort details the development and integration work done to deliver a working product acting as a foundation to build upon. Machine learning algorithms such as k-Nearest-Neighbors were also developed to estimate a mobile device's approximate location inside a building.
7

An Investigation of Technological Impressions in Steve Reich and Beryl Korot's Three Tales

MacRobbie, Danielle Elizabeth 19 December 2013 (has links)
No description available.

Page generated in 0.038 seconds