Search
Now showing items 1-10 of 23
CAPTURE - Cooperatively Applied Positioning Techniques Utilizing Range Extensions
(IEEE, 2014-10-27)
The most commonly implemented Indoor Location
Based Solution uses existing Wi-Fi network components to locate
devices within its range. While this technique offers obvious
economic rewards by utilizing a preinstalled ...
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(2012)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems
(IEEE, 2014-10-24)
The benefits of context aware computing and
specifically the context that location can provide to applications
and systems has been heavily documented in recent times.
Moreover the move from traditional outdoor ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Cooperatively Extending the Range of Indoor Localisation
(IET, 2013-06-17)
̶Whilst access to location based information has been mostly possible in the
outdoor arena through the use of GPS, the provision of accurate positioning estimations and
broad coverage in the indoor environment has proven ...
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Dynamically Extending the Reach of Wireless Networks in Determining Movement of Individuals Between Cells
(2011-06-22)
Location Based Systems are now a ubiquitous part of
everyday life, seamlessly assisting us in everything we do from
driving our cars to finding a cab, even preventing us missing our
bus or train stop when oversleeping ...