Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Irwin, Barry Vivian William"'
Publisher version
Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passw
Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passw
Externí odkaz:
http://hdl.handle.net/10962/68322
This paper presents a methodology using network attack ontology to classify computer-based attacks. Computer network attacks differ in motivation, execution and end result. Because attacks are diverse, no standard classification exists. If an attack
Externí odkaz:
http://hdl.handle.net/10962/d1009326
This paper describes the use of a low cost 2.4 GHz spectrum analyser, the MetaGeek WiSpy device, in conjunction with custom developed client-server software for the accurate identification of 2.4 GHz transmitters within a given area. The WiSpy dongle
Externí odkaz:
http://hdl.handle.net/10962/d1009325
This paper describes the use of a MetaGeek WiSpy dongle in conjunction with custom developed client-server software for the accurate identication of Wireless nodes within an organisation. The MetaGeek WiSpy dongle together with the custom developed s
Externí odkaz:
http://hdl.handle.net/10962/d1009324
Autor:
Irwin, Barry Vivian William
The use of Network Telescope systems has become increasingly popular amongst security researchers in recent years. This study provides a framework for the utilisation of this data. The research is based on a primary dataset of 40 million events spann
Externí odkaz:
http://hdl.handle.net/10962/d1004835
Autor:
Irwin, Barry Vivian William
Bandwidth management is a topic which is often discussed, but on which relatively little work has been done with regard to compiling a comprehensive set of techniques and methods for managing traffic on a network. What work has been done has concentr
Externí odkaz:
http://hdl.handle.net/10962/d1006492