Skip to main content

Research Repository

Advanced Search

Outputs (5)

Analysis and migration of location-finding methods for GSM and 3G networks. (2004)
Presentation / Conference Contribution
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004, October). Analysis and migration of location-finding methods for GSM and 3G networks. Presented at 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on, London

This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observed time difference). It shows how these techniques can be applied to the fu... Read More about Analysis and migration of location-finding methods for GSM and 3G networks..

Uzytkowanie Komputerow. (2004)
Book
Buchanan, W. J. (2004). Uzytkowanie Komputerow. Wkt (Poland)

Przyst?pny i praktyczny poradnik dotycz?cy u?ytkowania komputerów, obejmuj?cy szeroki zakres zagadnie? zwi?zanych z przetwarzaniem informacji i transmisj? danych oraz ich kompresj?, przechowywaniem, szyfrowaniem i bezpiecze?stwem, zawieraj?cy tak?e o... Read More about Uzytkowanie Komputerow..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..