Essay specific features





Written by:

Kathy H


Date added:

December 25, 2014








No of pages / words:

13 / 3372


Was viewed:

3859 times


Rating of current essay:

Essay content:

As part of a class project, students in our Computer Security course assisted in the development of a software tool, called WiVis, that uses interactive visualization to locate rogue access points. Distributed sensors are “profile mapped” to determine how they receive wireless signals from the environment around them...
displayed 300 characters

Custom written essay

All essays are written from scratch by professional writers according to your instructions and delivered to your email on time. Prices start from $11.99/page

Order custom paper

Full essays database

You get access to all the essays and can view as many of them as you like for as little as $28.95/month

Buy database access

Order custom writing paper now!

  • Your research paper is written
    by certified writers
  • Your requirements and targets are
    always met
  • You are able to control the progress
    of your writing assignment
  • You get a chance to become an
    excellent student!

Get a price guote


Visual displays of the maps as contour lines are overlaid onto a schematic of the office or lab space. When sensors detect an access point, contour line intersection visually show the predicted location of the device. The tool runs on standard platforms and requires no special hardware. INTRODUCTION Rogue access points are a critical security risk to wireless enterprise networks...
displayed 300 characters

General issues of this essay:

Related essays: