hh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
1234 151 - 160 av 160
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 151.
    Wernebjer Cervinus, Daniel
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Brorsson, Patrik
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    En Jämförelse mellan EnCase och BackTrack: Examensarbete på programmet IT-forensik och informationssäkerhet, 120 hp.2010Studentarbete andra termin, 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna rapporten är en jämförelse av forensiska verktyg, i detta fallet är verktygen EnCase och BackTrack. Vi kommer i den här rapporten att jämföra vissa utvalda verktyg som representeras i båda programmen, och analysera resultatet av detta. Analysen och jämförelsen kommer därefter ligga till grund för om man kan få fram lika bra resultat med ett open-source program som med ett program man betalar för. Vi kommer att utföra analysen genom att använda en bevisfil och utföra tester på den i både BackTrack och EnCase. Resultatet kommer att diskuteras och presenteras i denna rapport.För att få fram bästa möjliga resultat kommer vi även att intervjua vissa utvalda personer med erfarenhet utav att arbeta med dessa program, för att få fram deras synpunkter

  • 152.
    Westerberg, Adam
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Andersson, Alfred
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    IPv6, Är vi redo?: Teknisk rapport i Nätverksdesign och Datordrift2011Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Internet växer och växer. Utvecklingen i tredje världens länder men även det ökande nyttjandet av mobila enheter ställer helt nya krav på det numera föråldrade IP version 4 som kom redan 1981. Adresserna är i princip redan slut om man räknar varje uppkopplad nod, men det har man lyckats kringgå tack vare effektivare adressering med hjälp av VSLM och adressöversättning (NAT) Lösningen på fortsatt utveckling är troligtvis IP version 6.

    Rapporten kommer kartlägga hur IPv6 fungerar ur IT-administrativt syfte, och i vilken mån IPv6 kan användas idag, vilka bekymmer som kan uppstå och vilka alternativ det finns att ansluta sig till världen med IPv6 redan idag. Rapporten kommer också undersöka i vilken utsträckning existerande applikationer för slutanvändare och nätverksutrustning stödjer IPv6 och eventuellt vilka brister som finns i stödet.

  • 153. Westerlund, Daniel
    et al.
    Brunnegård, Oliver
    Anybus CompactCom on mbed2015Självständigt arbete på grundnivå (högskoleexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 154.
    Wikström, Alexander
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Thomson, Mark
    Mageramova, Lolita
    Virtual Private Networks:: A feasibility study of secure communications between remote locations.2014Självständigt arbete på grundnivå (högskoleexamen), 5 poäng / 7,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Virtual Private Networks (VPNs) are an integral part of protecting company communications from unauthorized viewing, replication or manipulation. In order for employees to remotely conduct business in an effective and secure manner from a branch location or while traveling, Virtual Private Networks can be viewed as an absolute necessity.

     

    Starting with a certain set of network communication requirements, our project's hypothesis was that the most suitable VPN implementation for Cheap Flats (a fictitious company we created) would be an IPSec client VPN. Included in the report are basic definitions, implementations and tests for three different types of VPNs that were used to confirm this hypothesis:

    1) Site-to-site: Tunnel mode connection between VPN gateways. The process of encrypting and transferring data between networks is transparent to end-users. [1]

    2) IPSec client: Network Layer VPN for both network-to-network and remote-access deployments. End-users will need to run either Cisco or Open Source VPN software on their PCs.

    3) Clientless SSL: “Remote-access VPN technology that provides Presentation Layer encryption services for Applications through local redirection on the client.” [2] VPN communications are established using a browser rather than specific software installed on the end-user’s device.

     

    The test results from the above VPN implementations have been published and comparisons were made between the different types of VPNs regarding the time taken to apply network device/end-user configurations, expenses incurred in procuring additional equipment/software to implement the VPN (if any), impact on end-users, scalability and lastly, the overall functionality of the VPN solution as it relates to the day-to-day business operations.

     

    Following the testing phase, a discussion of the merits and drawbacks of each of the VPN implementations was drafted. After which, a final recommendation was presented regarding the VPN solution that best fit the needs of the hypothetical company described in the paper.

  • 155.
    Xu, Junjie
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Su, Wenhui
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Performance Evaluations of Cisco ASA and Linux iptables Firewall Solutions2013Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    A firewall is an essential component to provide network security and traffic control. It is widely used to prevent illegal accesses to private or corporate networks from external unsafe source like Internet. Firewalls are basically classified into two types, hardware firewalls and software firewalls. Hardware-based is a single external hardware to a system, but software-based is installed on a computer inside a system. Two such firewalls, Cisco ASA 5505 and Linux iptables are implemented and practical evaluated theirs performance. The performance test in this paper work primarily focuses on Network layer, and the main parameters include Throughput, Latency, and Concurrent Sessions. Different performance monitoring tools are also introduced in this paper.

    As a network layer firewall, the most impressive feature is through inspecting the packets to manage the traffic from the higher Layer 4-7 of OSI (Open Systems Interconnection) model, which inevitably has a certain impact on the performance. The bottleneck of the whole network is determined by what extent the impact is. The primary objective of this thesis is through analyzing the test reports to evaluate the two type firewalls’ performance. Thus the results reported in this paper gives some ideas to new firewall customers about what aspects should be considered before selecting a suitable firewall product. 

  • 156.
    Younas, Muhammad
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    A comparative analysis of Cisco Performance Routing (PfR) and other performance enhancing techniques - Cisco QoS and Path Control2011Självständigt arbete på avancerad nivå (magisterexamen), 15 poäng / 22,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Eleven years ago Cisco introduced three types of applications on the same converged network and named it AVVID (Architecture for Voice, Video and Integrated Data). In spite of the initial interest and hype surrounding AVVID, the feature was and still is unable to confront problems such as: data priority, load balancing and network congestion. The work in this report addressed these issues within the network. Different Cisco Internetwork Operating System (IOS) methods: routing protocols, Cisco IOS QoS (including LLQ, LFI and Header Compression), Path Control and Cisco Performance Routing (PfR) were all tested to see which feature would work best at enhancing network performance.

    A practical network was created in which these features were carefully implemented one after another. In every step, the results were observed and recorded and if necessary repeated in order to check their validity. The results for RTT (Round Trip Time) and MOS (Mean Opinion Score) showed that in comparison to Path Control and Cisco IOS QoS (Quality of Service) mechanisms, Cisco PfR was able to generate routes on the fly during times of network congestion. This cannot be achieved with the use of Cisco QoS and Path Control which makes Cisco Performance Routing a far more superior feature. Although the focus of the work was VoIP (Voice over Internet Protocol) data, it is possible to construct a network with any application as Cisco PfR is able to reroute data. Cisco PfR is an easily accessible IOS feature which, once implemented, requires very little updating and maintenance.

  • 157.
    Yousuf, Azeem
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Mahmood, Faisal
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Site Survey for WLAN up Gradation at Halmstad University2011Självständigt arbete på grundnivå (kandidatexamen), 15 poäng / 22,5 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The university intends to upgrade the wireless network from IEEE 802.11 g to IEEE 802.11 n standard. The main task of thesis is to investigate the required number of access point for the update to IEEE 802.11 n. This thesis contains a survey of the campus site and provides suggestions for locations and number of access points required to provide good coverage and service quality.

  • 158.
    Yusuf, Adewale
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Lartey, Jerry
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Wareus, Vilhelm
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE).
    Network Admission Control (NAC)Securing end point devices2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    There have been remarkable growths in wireless communication networks in

    recent years; this is because of its merits over the wired networks such as

    Mobility and convenience. Wireless networks transmit the signal over the

    open air via radio waves of different frequencies, this makes it to be

    vulnerable to several attacks and anybody on the street can easily intercept the

    wireless data or inject new data into the entire network. There has been

    existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which

    was designed for wireless network security. There were concerns of security

    vulnerabilities in WEP; this made it necessary for the implementation of

    another solution to overcome the weaknesses of the previous wireless

    network security. The IEEE 802.1X (port-based network admission control)

    which is defined on Extensible Authentication protocol (EAP) provides

    effective and efficient admission control to wireless and other networks

    devices [8].

    Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security

    solution, access different vendor solutions, protocols supported and look into

    the inter-operability of these various vendors. In as much as we support the

    premise of NAC being an excellent solution, we will also make brilliant

    recommendations in this thesis to be considered for future refinements of this

    security solution as well as deployment scenarios for the university network.

  • 159.
    Zain-ul-Abdin,
    et al.
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Åhlander, Anders
    Business Area Electronic Defence Systems, Saab AB, Gothenburg, Sweden.
    Svensson, Bertil
    Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Centrum för forskning om inbyggda system (CERES).
    Programming Real-time Autofocus on a Massively Parallel Reconfigurable Architecture using Occam-pi2011Ingår i: Proceedings of the 19th Annual IEEE International Symposium on Field-Programmable Custom Computing Machines (FCCM'2011), Los Alamitos, Calif.: IEEE Computer Society, 2011, s. 194-201Konferensbidrag (Refereegranskat)
    Abstract [en]

    Recently we proposed occam-pi as a high-level language for programming massively parallel reconfigurable architectures. The design of occam-pi incorporates ideas from CSP and pi-calculus to facilitate expressing parallelism and reconfigurability. The feasability of this approach was illustratedby building three occam-pi implementations of DCT executing on an Ambric. However, because DCT is a simple and well studied algorithm it remained uncertain whether occam-pi would also be effective for programming novel, more complex algorithms.

    In this paper, we demonstrate the applicability of occam-pi for expressing various degrees of parallelism by implementinga significantly large case-study of focus criterion calculation inan autofocus algorithm on the Ambric architecture. Autofocus is a key component of synthetic aperture radar systems. Two implementations of focus criterion calculation were developedand evaluated on the basis of performance. The comparison of the performance results with a single threaded software implementation of the same algorithm show that the throughput of the two implementations are 11x and 23x higher than the sequential implementation despite a much lower (9x) clock frequency. The two designs are, respectively, 29x and 40x moreenergy efficient.

  • 160.
    Zeadally, Sherali
    et al.
    Univ Dist Columbia, Dept Comp Sci & Informat Technol, Network Syst Lab, Washington, DC 20008 USA..
    Hunt, Ray
    Univ Canterbury, Coll Engn, Dept Comp Sci & Software Engn, Christchurch 1, New Zealand..
    Chen, Yuh-Shyan
    Natl Taipei Univ, Dept Comp Sci & Informat Engn, San Shia, Taipei County, Taiwan..
    Irwin, Angela
    Univ S Australia, Sch Comp & Informat Sci, Mawson Lakes, SA 5095, Australia..
    Hassan, Aamir
    Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
    Vehicular ad hoc networks (VANETS): status, results, and challenges2012Ingår i: Telecommunications Systems, ISSN 1018-4864, E-ISSN 1572-9451, Vol. 50, nr 4, s. 217-241Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work have focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. We survey some of the recent research results in these areas. We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union. In addition, we also briefly present some of the simulators currently available to VANET researchers for VANET simulations and we assess their benefits and limitations. Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services.

1234 151 - 160 av 160
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf