-
The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include
* __hardware interfaces__ for common Software Defined Radios
* __easy demodulation__ of signals
* __assigning participants__ to keep overview of your data
* __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening
* __assign labels__ to reveal the logic of the protocol
* __fuzzing component__ to find Security leaks
* __modulation support__ to inject the data back into the system
* __simulation environment__ to perform stateful attacks
標簽:
Universal
Hacker
Radio
The
URH
上傳時間:
2018-11-23
上傳用戶:milo
-
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, Security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems
Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing
Includes topics related to CPS such as architecture, system, networking, application, algorithm, Security and privacy
標簽:
Cyber-Physical
Systems
上傳時間:
2019-04-21
上傳用戶:danyun
-
Digital cellular telecommunications system (Phase 2+);
Security mechanisms for SIM application toolkit;
Stage 2
(3GPP TS 03.48 version 8.8.0 Release 1999)
標簽:
GSM
上傳時間:
2019-06-14
上傳用戶:twogozi
-
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the Security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
標簽:
Fundamental
Limits
Secure
Class
on
of
上傳時間:
2020-01-04
上傳用戶:kddlas
-
New applications such as video conferencing, video on demand, multi-
media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed
collaboration, and intranet Security require advanced functionality from
networks beyond simple forwarding congestion control techniques.
標簽:
Programmable
Networks
Active
and
上傳時間:
2020-05-26
上傳用戶:shancjb
-
Developers, manufacturers and marketers of products incorporating short-
range radio systems are experts in their fields—Security, telemetry,
medical care, to name a few. Often they add a wireless interface just to
eliminate wires on an existing wired product. They may adapt a wireless
subsystem, which is easy to integrate electrically into their system, only to
find that the range is far short of what they expected, there are frequent
false alarms, or it doesn’t work at all. It is for these adapters of wireless
subsystems that this book is primarily intended.
標簽:
Communication
Short-range
Wireless
上傳時間:
2020-06-01
上傳用戶:shancjb
-
In this updated and expanded edition of her excellent telecommunications primer,
Lili explains in just the right detail everything you need to know to become
fluent in this most important and fascinating industry. Besides including a
satisfying amount of expert technical detail, the book also discusses equally
crucial aspects of how communications technology affects society, culture, and
politics. Electronic communications is changing the world for the better; learn
from Lili's expertise how you, too, can participate in the revolution." Steve Riley, senior Security strategist, Microsoft
Corporation
標簽:
Telecommunications
Essentials
Global
Source
上傳時間:
2020-06-01
上傳用戶:shancjb
-
Over the past few decades there has been an exponential growth in service robots
and smart home technologies, which has led to the development of exciting new
products in our daily lives. Service robots can be used to provide domestic aid for
the elderly and disabled, serving various functions ranging from cleaning to enter-
tainment. Service robots are divided by functions, such as personal robots, field
robots, Security robots, healthcare robots, medical robots, rehabilitation robots and
entertainment robots. A smart home appears “intelligent” because its embedded
computers can monitor so many aspects of the daily lives of householders. For
example, the refrigerator may be able to monitor its contents, suggest healthy alter-
natives and order groceries. Also, the smart home system may be able to clean the
house and water the plants.
標簽:
Robotics
Service
Digital
within
Home
the
上傳時間:
2020-06-06
上傳用戶:shancjb
-
This is a practical book, to be sure, but it is also a book about hope and posi-
tive change. I am quite sincere. The delivery of electricity is deeply rooted
in the principle of universal access; when clean, reliable energy is available it
contributes to poverty alleviation, improved social conditions, and enhanced
economic development. In the developed world, we know this to be true. The
digital fabric of our lives is a testimony to the importance of energy Security.
Across the globe, we have seen the vital contributions that electrification has
brought to the development of economies and an enhanced quality of life.
Nonetheless, this supreme engineering achievement has languished, and we are
deeply challenged.
標簽:
Strategies
Analytics
Data
Big
上傳時間:
2020-06-07
上傳用戶:shancjb
-
The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in
supporting the evolution of conventional electrical grids toward active, flexible and self-
healing web energy networks composed of distributed and cooperative energy resources.
From a conceptual point of view, the SG is the convergence of information and
operational technologies applied to the electric grid, providing sustainable options to
customers and improved Security. Advances in research on SGs could increase the
efficiency of modern electrical power systems by: (i) supporting the massive penetration
of small-scale distributed and dispersed generators; (ii) facilitating the integration of
pervasive synchronized metering systems; (iii) improving the interaction and cooperation
between the network components; and (iv) allowing the wider deployment of self-healing
and proactive control/protection paradigms.
標簽:
Computational
Intelligence
上傳時間:
2020-06-07
上傳用戶:shancjb