Latest world news: - Fake Google Update Steals Private Data from 337 Apps RSS Feed

Home>Articles>System Threat Analysis for High Assurance Software Defined Radios
Top keyloggers
View more...

System Threat Analysis for High Assurance Software Defined Radios

  •  
User rating: no reviews. Be the first to review it! 0 - 1 votes
AUTHORS' DESCRIPTION

This paper surveys the tools and blended attack methods used by hackers to attack and exploit WIFI equipped mobile terminals. The paper then examines parallels between the WIFI scenario and similar threats to software defined radio terminals and networks by wireless hackers. We conclude by proposing requirements and architectures for high assurance SDR.
Date publication:
Read the full article
Home>Articles>System Threat Analysis for High Assurance Software Defined Radios
IMPORTANT! Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law.