• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6562
  • 1927
  • 919
  • 814
  • 686
  • 373
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 77
  • 76
  • Tagged with
  • 14837
  • 2974
  • 2027
  • 1876
  • 1454
  • 1382
  • 1345
  • 1298
  • 1264
  • 1169
  • 1155
  • 1149
  • 1075
  • 1030
  • 952
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
861

Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri

Ohaeri, Ifeoma Ugochi January 2012 (has links)
With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as a promising solution to the scarcity of spectrum. A basic operation of the CRs is spectrum sensing. Whenever a primary signal is detected, CRs have to vacate the specific spectrum band. Malicious users can mimic incumbent transmitters so as to enforce CRs to vacate the specific band. Cognitive radio networks (CRNs) are expected to bring an evolution to the spectrum scarcity problem through intelligent use of the fallow spectrum bands. However, as CRNs are wireless in nature, they face all common security threats found in the traditional wireless networks. Common security combating measures for wireless environments consist of authorization, authentication, and access control. But CRNs face new security threats and challenges that have arisen due to their unique cognitive (self-configuration, self-healing, self-optimization, and self-protection) characteristics. Because of these new security threats, the use of traditional security combating measures would be inadequate to address the challenges. Consequently, this research work proposes an Intrusion Detection and Response Model (IDRM) to enhance security in cognitive radio networks. Intrusion detection monitors all the activities in order to detect the intrusion. It searches for security violation incidents, recognizes unauthorized accesses, and identifies information leakages. Unfortunately, system administrators neither can keep up with the pace that an intrusion detection system is delivering responses or alerts, nor can they react within adequate time limits. Therefore, an automatic response system has to take over this task by reacting without human intervention within the cognitive radio network. / Thesis (M.Sc.(Computer Science) North-West University, Mafikeng Campus, 2012
862

Assessment of operational cost and level of income on poultry food security project in Ngaka Modiri Molema North West province, South Africa / Barileng Leornard Mogoje

Mogoje, Barileng Leornard January 2011 (has links)
The aim of this study was establish operational systems and viable size of community poultry projects versus number of beneficiaries to determine the capacity to sustain itself and serve its purpose as food security projects. Community poultry projects are expected to serve their purpose of securing food to beneficiaries and continue to run sustainably for longer time. The current study uses qualitative method to assess the performance of community poultry projects. The study used questionnaire to collect primary data by interviewing the accessible beneficiaries of existing poultry community. The results of the survey revealed that the majority of community poultry projects are not viable to fulfil purpose of their establishment which is to secure food for beneficiaries and to be self-sustainable. However, the average value of reward was equivalent to R3 a day from both broiler and layer projects. The study further revealed that the reward was paid once a year. The rewards in terms of product were expected to be consumed by household and transferred into cash to buy other types of food required. The food is mainly determined by the size of the household. However the question remains, R3 a day is sufficient to buy food for a family for four members. Based on the outcome of this study, researcher encourages further research into to all agricultural related community food security projects. Research studies may determine if these projects are really aimed at helping economic growth in rural communities or whether they have capacity to secure basic food for beneficiaries while sustaining them self. Agreed minimum value of reward per beneficiaries must be established to ensure a future perfect match on size on all agricultural projects versus number of beneficiaries. / Thesis (MBA) North-West University, Mafikeng Campus, 2011
863

A SECURE MEDIA STREAM COMMUNICATION FOR NEXT GENERATION NETWORK

Wu, Hao, Zhong, Zhangdui 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / In NGN, the open interfaces and the IP protocol make the hazard of security aspect increased accordingly. Thereby, it is a very important premise for NGN network operation to afford a good secure media stream communication. In this paper, we will present a secure media stream communication for NGN. Then we will discuss the three parts of the media stream secure communication——media stream source authentication, secret key negotiation and distribution; media stream encryption/decryption in detail. It can effectively realize media stream end-to-end secure communication. Meanwhile, it also makes use of the expanding of former protocol during the secret key negotiation process.
864

APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS.

Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California / Over the past few years models for Internet based sharing and selling of telemetry data have been presented [1] [2] [3] at ITC conferences. A key element of these sharing/selling architectures was security. This element was needed to insure that information was not compromised while in transit or to insure particular parties had a legitimate right to access the telemetry data. While the software managing the telemetry data needs to be security conscious, the networked computer hosting the telemetry data to be shared or sold also needs to be resistant to compromise. Intrusion Detection Systems (IDS) may be used to help identify and protect computers from malicious attacks in which data can be compromised.
865

Touching the void : the museological implications of theft on public art collections

Seaton, Jillian Elizabeth January 2014 (has links)
Of central importance to this thesis is the way security measures contradict the process through which museums have been seeking to divest themselves of theoretical hierarchies and value judgments in recent years. A context for investigation is established that considers how a perceptible increase in art theft, complicated by the escalating value of individual objects and the proliferation of museums as represented by a rise in attendance figures has produced a climate of vulnerability for arts collections around the world. In response, museums are installing unprecedented levels of security that are having a significant impact on established viewing conditions and redefining museum space. Further hindering this situation is the disparity between the fields of museology and museum security. These two fields have grown simultaneously, yet independently of one another producing a significant paradox between museum rhetoric and practice. To address the disconnection, this thesis seeks to make museum security relevant to academic discourse by aligning features related to the safeguarding of collections with contemporary museological considerations. Taking the void left behind by a stolen object as a point of departure, this thesis examines the ways in which theft alters the relationship between viewer, object and space in the museum setting. Three major case studies each form a chapter exploring the impact of the theft on established viewing conditions. As the first art theft of the modern era, the theft of the Mona Lisa from the Louvre, Paris (1911) creates an historic precedence for this investigation allowing for the examination of how conventions based upon exclusivity were dismantled by the theft, only to be reproduced by a legacy of increasingly prohibitive security measures. The theft of thirteen objects from the Isabella Stewart Gardner Museum, Boston (1990) is used to address the implications of theft on a fixed and introspective collection, and in particular upon institutional identity and public memory. The theft of the Scream and Madonna from the Munch Museum, Oslo (2004) and its subsequent security upgrade reveal a negation of institutional transparency and the birth of a new security aesthetic. An analysis of each space is balanced against material gathered from a variety of visual, textual and ephemeral sources to produce a developed understanding of affected space.
866

Methods for improving unfamiliar face matching

Dowsett, Andrew James January 2015 (has links)
Matching unfamiliar faces is known to be a very difficult task. Yet, despite this, we frequently rely on this method to verify people's identity in high security situations, such as at the airport. Because of such security implications, recent research has focussed on investigating methods to improve our ability to match unfamiliar faces. This has involved methods for improving the document itself, such that photographic-ID presents a better representation of an individual, or training matchers to be better at the task. However, to date, no method has demonstrated significant improvements that would allow the technique to be put into practice in the real world. The experiments in this thesis therefore further explore methods to improve unfamiliar face matching. In the first two chapters both variability and feedback are examined to determine if these previously used techniques do produce reliable improvements. Results show that variability is only of use when training to learn a specific identity, and feedback only leads to improvements when the task is difficult. In the final chapter, collaboration is explored as a new method for improving unfamiliar face matching in general. Asking two people to perform the task together did produce consistent accuracy improvements, and importantly, also demonstrated individual training benefits. Overall, the results further demonstrate that unfamiliar face matching is difficult, and although finding methods to improve this is not straightforward, collaboration does appear to be successful and worth exploring further. The findings are discussed in relation to previous attempts at improving unfamiliar face matching, and the effect these may have on real world applications.
867

The structure of the welfare state

MacCulloch, Robert January 1996 (has links)
No description available.
868

Non-repudiation

Zhou, Jianying January 1997 (has links)
No description available.
869

On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform

Tan, Song 07 May 2016 (has links)
A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and actuators from physical world. Due to the system complexity, typically the high cohesion of communication and power system, the Smart Grid innovation introduces new and fundamentally different security vulnerabilities and risks. In this work, two important research aspects about cyber-physical security of Smart Grid are addressed: (i) The construction, impact and countermeasure of data integrity attacks; and (ii) The design and implementation of general cyber-physical security experiment platform. For data integrity attacks: based on the system model of state estimation process in Smart Grid, firstly, a data integrity attack model is formulated, such that the attackers can generate financial benefits from the real-time electrical market operations. Then, to reduce the required knowledge about the targeted power system when launching attacks, an online attack approach is proposed, such that the attacker is able to construct the desired attacks without the network information of power system. Furthermore, a network information attacking strategy is proposed, in which the most vulnerable meters can be directly identified and the desired measurement perturbations can be achieved by strategically manipulating the network information. Besides the attacking strategies, corresponding countermeasures based on the sparsity of attack vectors and robust state estimator are provided respectively. For the experiment platform: ScorePlus, a software-hardware hybrid and federated experiment environment for Smart Grid is presented. ScorePlus incorporates both software emulator and hardware testbed, such that they all follow the same architecture, and the same Smart Grid application program can be tested on either of them without any modification; ScorePlus provides a federated environment such that multiple software emulators and hardware testbeds at different locations are able to connect and form a unified Smart Grid system; ScorePlus software is encapsulated as a resource plugin in OpenStack cloud computing platform, such that it supports massive deployments with large scale test cases in cloud infrastructure.
870

JAVA: A PARADIGM SHIFT IN TELEMETRY SOFTWARE ARCHITECTURES

Yang, Kent 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / In the commercial marketplace, Java has emerged as the preeminent standard for platform-independent application development. Many reasons for this include platform independence, robustness, effective distribution models, security effectiveness, and a rich set of application programming interfaces (APIs). This paper will provide insight into the design of the Java platform as it relates to the development of telemetry systems. Specific elements of Java will be explored to better understand how to take advantage of a Java platform. The paper will conclude with examples showing Java's effectiveness on overall software development and deployment, the benefits of reduced new code implementations, and how deploying this unique software platform will change the software paradigm in the real-time environment.

Page generated in 0.0567 seconds