Contents
Academic literature on the topic 'Avlyssning'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Avlyssning.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Avlyssning"
Kihlgren, Alexander. "System för avlyssning, modifiering och överföring av analoga signaler." Thesis, Linköpings universitet, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102726.
Full textChahine, Rana. "Den bevisrättsliga hanteringen av överskottsinformationvid hemlig avlyssning av elektronisk kommunikation." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-81237.
Full textDegeryd, Desiré, and Linnea Holmgren. "HEMLIG AVLYSSNING AV ELEKTRONISK KOMMUNIKATION : - Ett rättssäkert tvångsmedel i brottsbekämpningen?" Thesis, Karlstads universitet, Handelshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-43461.
Full textTrygg, Johan, and Damir Pervan. "App-sniffer." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-17175.
Full textWallin, Andreas, Jonas Rubensson, and Alexander Iggstrand. "Allmänhetens säkerhetsmedvetenhet med avseende på trådlös kommunikation." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26644.
Full textPublic wireless networks are more available than ever. The networks all havesomething in common—they can be tapped in to, which poses the risk of sensitiveuser information being compromised. This research paper explores the public’ssecurity awareness with regards to public wireless networks by two differentmethods. One technical experiment in which, access to a public wireless networks inseveral different locations were offered. This allowed us to, in real-time, assess thesafety awareness of the users of our public wireless network, by analyzing theirnetwork traffic. The second was a survey, which were distributed to our sample ofpeople. It asked the sample questions about how they perceive their own behavioron a public wireless network. Thus, the survey allowed us to get an idea of theknowledge and the security awareness the public in general believe that they have.The results from our research indicate that people’s security awareness can andshould be improved. One first step towards improvement would be educationconcerning the risks that exist and how to avoid them, which is something that will be brought up in this paper.
Hedbrant, Joel, and Marcus Gustavsson. "Automatiserad mjukvarusandlåda : En prototyp för automatisk installation och testning av öppna programvarors anslutningar i en dedikerad miljö." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19524.
Full textHilbertsson, Henrik. "Riskerna med smarta mobiltelefoner i svenska markförband." Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7543.
Full textIn this thesis, the risks of smartphones in Swedish land forces are analysed from anElectronic Warfare perspective, focusing on Signals Intelligence. The analysis is based on a fictitious scenario in a national context involving two differentactors. One actor uses smartphones and the other actor uses high technology ElectronicWarfare systems to exploit the phones. Based on risk indicators developed in the thesis, twodifferent cases are created, which are then analysed using a qualitative method with elementsof quantitative calculations. The results reveal that smartphones, used in Swedish land forces, put both individuals andunits at risk. The risks, analysed, are interception, location and revealing information fromthe phone’s Global Navigation Satellite System geotagging and functions. Therefore, the useof smartphones might unintentionally reveal information. Consequently, the use ofsmartphones requires an understanding of the risks generated. It is not possible to avoid risks,so the benefit of using smartphones must be weighed against the risk in each situation.
Hyrkäs, Nathalie, and Erik Karlsson. "Sårbarhetsanalys av IKEA TRÅDFRI rörelsesensor." Thesis, KTH, Hälsoinformatik och logistik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-296528.
Full textThis report evaluates the Ikea TRÅDFRI motion sensor communication protocol from a security point of view. Internet of Things is constantly expanding and with its growth it is important to examine products on the market to see how security is implemented. Different options on ways to evaluate the product is explored in the report. That includes methods of how an unauthorized person could gain access to information through eavesdropping, if they could take over the communication by pairing to a light source from a long distance, and an assessment of the degree of vulnerability by Totalförsvarets forskningsinstitut. The results show that it is possible to exploit the device through a side-channel attack and also how pairing is enabled on a longer distance than what is specified.
Gustafsson, Robin, and Linus Janstad. "Säkerhetsutvärdering av smarta dörrlås utifrån ett kommunikationsperspektiv." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20427.
Full textThe interest in smart homes is increasing rapidly. As the smart home concept has evolved and wireless communication has become the norm, the complexity of the systems have increased and additional security and privacy problems have surfaced. The purpose of this paper is to examine if any information can be extracted from the communication of a smart door lock currently available on the market. This has been investigated in form of experiments through the interception of the door lock’s communication followed by automated and manual analysis of the data collected. The results of the study show that interception can be used to categorize the communication and for mapping of interaction with the connected door lock.
Marklind, Anton, and Simon Marklind. "Relay-attacker : Utnyttjande av trådlösa bilnycklar." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40262.
Full textOn a daily basis the car is frequently used, and a lot of people arein need of their cars. New technologies are developed to make it easierfor car owners to unlock the car and drive away without making theeffort of using the car keys. A technology called “keyless” car keys areimplemented in modern cars, the car keys sends out radio frequenciesin an interval on a couple of seconds.But is a complete wireless key system secure enough? The radiosignals are open to whoever wants to listen to them, and that couldhave devastating consequences. If it is open to everyone, then it shouldalso be possible to record these signals and send them out using a radiotransmitter. It’s called a relay attack and the purpose of this report isto get broader perspective of how an attack like that works and howeasy it is to execute the attack. The experiment was performed ondifferent types of cars and their keys with varying frequencies.
Books on the topic "Avlyssning"
Malm, Mats. Poesins röster: Avlyssningar av äldre litteratur. Stockholm/Höör: Brutus Östlings Bokförlag Symposion, 2011.
Find full text