• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 3
  • 1
  • Tagged with
  • 10
  • 10
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Mobility Analysis of Zoo Visitors

Byström, Kim January 2019 (has links)
In a collaboration between Kolmården Zoo and Linköping University, supported by the Norrköping municipality’s fund for research and innovation, mobility measurements have been performed inside the zoo. These measurements have been done by six WiFi sniffers collecting anonymised MAC addresses from the visitors smartphones. The aim of this thesis is to analyse these data to understand visitor flows in the park and other statistics using a model based mobility analysis. The work implies that one can make a rather good prediction of the geographical visitor distribution using this equipment and statistical models. / I ett samarbete mellan Kolmården djurpark och Linköpings universitet, sponsrat av Norrköpingskommuns fond för forskning och utveckling, har rörelsemätningar gjorts inuti parken. Mätningarna har utgjorts av sex WiFi-sniffers som samlar in anonymiserade MAC-adresser från besökares smartphones. Målet med detta arbete är att analysera denna data för att förstå besökarflöden i parken och annan statistik genom att använda en modellbaserad rörelseanalys. Arbetet visar att man med denna utrsutning och statistiska metoder kan skapa en god prediktion av hur den geografiska besökardistributionen ser ut över tid.
2

Penetrační testování ANC / Penetration testing of ANC

Dušek, Jakub January 2021 (has links)
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
3

Návrh přepínače využitelného v moderních komunikačních sítích / Design of Switch Used in Modern Communication Networks

Mojžiš, Ľubomír January 2015 (has links)
This diploma thesis deals with switching components of modern communication networks. A switch architecture focused on the quality of service is described in this paper and there are two switch models designed and simulated in the simulating program MATLAB-SIMULINK. The first model is based on classic switching and the other one is controlled by neural network. A laboratory exercise suitable for communication networks education is created in this paper on the basis of designed models.
4

Anonymizace PCAP souborů / Anonymization of PCAP Files

Navrátil, Petr January 2020 (has links)
This diploma thesis deals with the design and implementation of an application suitable for the anonymization of PCAP files. The thesis presents TCP/IP model and for each layer highlights attributes that can be used to identify real people or organizations. Some of the anonymization methods suitable to modify highlighted attributes and sensitive data are described. The implemented application uses TShark tool to parse byte data of PCAP format to JSON format that is used in the application. TShark supports lots of network protocols which allows the application to anonymize various attributes.  Anonymization process is controlled by anonymization politics that can be customized by adding new attributes or anonymization methods.
5

Bluetooth-enheter i offentliga rummet och anonymisering av data

Nilsson, Mattias, Olsson, Sebastian January 2015 (has links)
Internet of Things (IoT) ger stora möjligheter att samla in data för olika syfte som till exempel att estimera antalet personer för att styra värmen i ett rum. Vidare så kan IoT-system automatisera uppgifter som kan hjälpa oss människor. Den här studien syftar till vilken typ av data som kan vara intressant att samla in för att kunna estimera antalet personer på en offentlig plats. Det handlar även om hur känslig data som samlas in kan anonymiseras. För att göra detta så valdes det att undersöka hur MAC-adresser från Bluetooth-enheter skulle fungerar för att uppskatta antalet personer. För att samla in MAC-adresser så utvecklades ett proof of concept-system där en Android-applikation samlade in MAC-adresser som anonymiserades innan de lagrades i en databas. Applikationen anonymiserar den unika MAC-adressen enligt tre nivåer med olika säkerhet. Fältstudier gjordes där antalet personer räknades visuellt sedan gjordes anonymiserade insamlingar av MAC-adresser. Slutsatsen var att Bluetooth blir svårt att använda för att estimera antal personer eftersom alla inte har Bluetooth på. Applikationen som utvecklats påvisar att data kan samlas in säkert och på så sätt inte kränka integritet. / Internet of Things (IoT) provides great opportunities to collect data for different purposes such as to estimate the number of people to control the heat in a room. Furthermore, IoT systems can automate tasks that can help us humans. This study is aimed at the type of data that can be interesting to gather in order to estimate the number of people in a public place. It is also about how sensitive data can be anonymized when gathered. To do this, Bluetooth devices was chosen for investigating how the MAC addresses would work to estimate the number of people. For collecting MAC addresses a proof of concept system was developed, where an Android application was used to collect MAC addresses. These MAC addresses were anonymized before being stored in a database. The application anonymize the unique MAC address according to three levels of security. Field studies were conducted as the number of people were counted visually then anonymous collection of MAC addresses were made. The conclusion was that Bluetooth will be difficult to use for estimating the number of people because not everyone has Bluetooth on. The application developed demonstrates that data can be collected safely and thus does not violate privacy.
6

A Study on Fingerprinting of Locally Assigned MAC-Addresses

Djervbrant, Karl-Johan, Häggström, Andreas January 2019 (has links)
The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. The accuracy of counted devices was however not accurate enough for a commercial use and this is where this candidate Thesis will continue research on how to improve the accuracy. It introduces the fundamental problem on how one cannot directly count transmitted MAC-Addresses to count present devices, since the manufacturers implement features against this such as MAC-Address randomization. It covers how manufacturers are not consistent in their implementation of the IEEE 802.11 standard, how this can be utilized to estimate how many devices are present in the networkwith three different approaches. It also concludes that Control Frame Attacks is not a viable approach any longer to count devices and the best method for counting devices are a combination of Passive Probe Request Analysis techniques. / Mängden enheter som kommunicerar över WiFi ökar dagligen och idag bär de flesta människor en enhet med ett aktiverat WiFi-nätverkskort. Detta använder EffectSoft AB, ett företag i Halmstad till sin teknik Flow för att räkna mobila enheter. Noggrannheten för beräkningen är dock inte tillräckligt bra för att produkten ska kunna vara applicerbar på marknaden och därav handlar denna kandidatuppsatsen om beräkning av mobila enheter. Denna rapport presenterar de problem som man stöter på vid beräkning av mobila enheter som till exempel randomisering av MAC-Adresser. Den täcker även hur tillverkare inte är konsekventa i sin implementation av IEEE 802.11 standarden och hur detta kan utnyttjas genom tre metoderför beräkning av antal mobila enheter. Det fastställs att Control Frame Attack inte längre är en möjlig metod för syftet samt att den bästa metoden för beräkning avantalet mobila enheter är en kombination av olika passiva Probe Request analyser.
7

Optimalizace přepínače v konvergované síti / Switch optimization in converged network

Švec, Adam January 2013 (has links)
Switch Optimization in a Converged Network thesis discusses the role of the Ethernet switch in the network. It describes differences between the switch and the hub in the network and the impacts on the collision domain size. In the converged network, priority data switching according to their origin and thus the qualitative point of view is also addressed - e-mails, voice services and multimedia will each behave differently. A real element, switch L3 - a switch with services quality support - is mentioned. The tool Matlab - Simulink is briefly described and a functional simplified model of the ethernet switch was created. Furthermore, the topic was used as a theme for a laboratory task in the subject Services of Telecommunication Networks. A model for Simulink and an example of the laboratory protocol for the created task are attached to the thesis.
8

Meteostanice s rozhraním Ethernet / Weather Station with Ethernet Interface

Novák, Pavel January 2013 (has links)
This thesis deals with the design and construction of the meteorological station. The meteorological station is designed and constructed to be able to measure the basic meteorological parameters (temperature, humidity, air pressure) and the other three variables (measuring rainfall, wind speed, wind direction). This thesis will introduce you to meteorology. Meteorology determines the daily weather forecast and the results are used for examples in aviation or maritime affairs. The method of atmospheric origin is given in the theoretical part. Meteorology must use measuring instruments to determine quantities. The dissertation also includes analysis of the measuring instruments. The meteorological station uses the Ethernet technology. In the chapter devoted to Ethernet are described its principles, types and method of power supply over Ethernet. The following section describes the design of the entire meteorological station, selection of all components and description of their connection. The chapter about implementation contains a description of the parts which forms program part of the meteorological station. The aim of the thesis is a summary of the achieved results including price comparison of the renovated meteorological station with other meteorological stations, which can be normally bought.
9

Systém pro řízení intenzity osvětlení / Intelligent lightning system

Harman, Ján January 2011 (has links)
The aim of my master’s thesis is a system for control of the light intensity. It is electronic equipment which controls the intensity of the light circuits based on settings and input signals. This equipment could work on single-phase systems or multiphase systems. The equipment is controlled by the signal DMX-512 which is a standard for the control of lighting technologies. The set up of this equipment is based on a personal computer or in a limited form by a small connected display.
10

Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities

Berrios-Ayala, Mark 01 December 2013 (has links)
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.

Page generated in 0.0493 seconds