نتایج جستجو برای: Unauthorized Access
تعداد نتایج: 329692 فیلتر نتایج به سال:
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...
This letter proposes a higher order moments-based spectrum sensing method for detecting unauthorized accesses in underlay cognitive satellite communication networks. Exploiting the second, fourth and sixth-order moments of received signal, an estimate hidden signal power is evaluated. Then, estimation user used as decision variable to distinguish among presence or absence transmission within ne...
In today's world, the number of cyber attacks is increasing every year. These lead to massive loss confidential data, disruption critical infrastructure. The cyberattacks has only increased since beginning pandemic and carries with it significant financial reputational risks for any company. work considers possible methods testing security organization's corporate network against unauthorized p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید