• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 433
  • 94
  • 81
  • 59
  • 37
  • 36
  • 12
  • 8
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 972
  • 242
  • 179
  • 132
  • 110
  • 107
  • 102
  • 91
  • 87
  • 85
  • 78
  • 76
  • 76
  • 71
  • 69
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
511

Intrusion detection techniques in wireless local area networks

Gill, Rupinder S. January 2009 (has links)
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
512

On optimising FAC(M) counter missile tactics : a dynamic simulation model to optimise soft kill tactics employed by a generic fast attack craft against a generic surface-to-surface, fire-and-forget missile

Engelbrecht, Gerhard Nieuwoudt 11 1900 (has links)
The aim of this dissertation is to show how counter missile tactics for a fast attack craft armed with missiles [FAC(M)] against a surface-to-surface, fireand- forget missile [SSM] can be optimised. As a result the ship and missile will be modelled as generic concepts while the environment will be a chosen area of operations. The applicable methodology is to simulate the ship, missile and environment as well as the interactions between them. At the same time, the ship will be carrying out combinations of five separate missile counter measures. The methodology is then to build a dynamic simulation model to optimise soft kill tactics by a generic F AC(M) against a generic SSM in the chosen environment and evaluate the outcome of the simulation by viewing the experiment as a 25 factorial design and to analyse it accordingly. / Operations Research / Operations Management / M.Sc. (Operations Research)
513

Développement de nouveaux composites cimentaires à bas module d'élasticité : propriétés mécaniques et durabilité vis-à-vis des sollicitations environnementales / Development of new low-modulus cementitious composites : mechanical properties and durability towards environmental solicitations

Blanc, Gaël 14 March 2017 (has links)
Cette thèse, menée dans le cadre d'une Convention Industrielle de Formation par la Recherche (CIFRE) avec l'entreprise MENARD, est consacrée à l'étude de la durabilité d'un procédé particulier de renforcement de sol appelé Colonnes à Module Contrôlé (CMC). Cette application consiste en la mise en place d'un réseau d'inclusions verticales semi-rigides dans un sol afin d'améliorer les caractéristiques globales du terrain avant construction. Ces travaux font suite aux travaux de thèse de François Duplan (2011-2014) sur le développement de nouveaux composites cimentaires destinés à cette application. Dans ce but, il avait optimisé des compositions de mortiers incorporant des granulats spéciaux tels que des billes d'argile expansée ou des granulats en caoutchouc issus du broyage de pneus usagés. Les effets de l'introduction de ces granulats dans les composites ont été analysés aussi bien à l'état frais qu'à l'état durci et complètent les précédentes analyses de F. Duplan, notamment en termes d'indicateur de durabilité (perméabilité aux gaz, diffusion aux ions chlorures) et de comportement mécanique à long terme (retrait et fluage). A l'issue d'une analyse environnementale de l'application, trois mécanismes potentiels de dégradation ont été sélectionnés pour des investigations sur la durabilité des CMC : l'attaque acide, l'attaque sulfatique externe et la dégradation par cristallisation de sels. La réalisation d'essais accélérés en laboratoire a permis de mettre en évidence la pertinence du ciment CEM III/C, utilisé actuellement par MENARD, dans la majorité des cas. La faible teneur en C3A de ce liant permet en effet de limiter la production d'éléments expansifs dans le cas d'une attaque sulfatique externe et sa proportion limitée en hydrates du clinker (en particulier en portlandite) ainsi que le faible rapport C/S des C-S-H assurent une meilleure tenue aux attaques acides. La dégradation par remontée capillaire et cristallisation de sels dépendant avant tout des caractéristiques du réseau poreux et des conditions d'évaporation et beaucoup moins du type de ciment, l'utilisation du ciment CEM III/C présente moins d'intérêt. L'incorporation de granulats en caoutchouc ou de billes d'argile expansée dans les composites ne modifie qu'à la marge leur tenue aux mécanismes de dégradations testés. La majorité des phénomènes de dégradation de l'application étant liée à la pénétration d'agents agressifs au cœur des composites cimentaires, la prédiction des propriétés diffusives du matériau est essentielle dans l'estimation des risques encourus par l'application. Un nouveau modèle prédictif est proposé et comporte deux échelles d'homogénéisation : la première au niveau de la pâte de ciment et la deuxième au niveau du mortier. Les résultats obtenus par ce modèle sont fidèles aux résultats expérimentaux avec des erreurs relatives inférieures à 15%. L'estimation du coefficient de diffusion est globalement plus précise pour les composites incorporant des billes d'argile expansée que pour ceux incorporant des granulats en caoutchouc, une conséquence de la forme sphérique de ces billes mieux en accord avec les hypothèses du modèle mis en œuvre. / This CIFRE PhD-thesis carried out within the framework of Convention Industrielle de Formation par la REcherche (CIFRE) with the company MENARD, focuses on the durability of a specific soil-reinforcement system called Controlled Modulus Columns (CMC) which consists in a network of semi-rigid vertical inclusions cast into the ground in order to enhance its global characteristics before building. This study comes after the PhD work conducted by François Duplan (2011-2014) on the design of new cementitious composites intended for the CMC application and incorporating innovative aggregates like expanded clay grains or rubber aggregates obtained by grinding end-of-life tyres. The effects of addition of such aggregates into the composites have been studied both at fresh and hardened states and complete Duplan previous findings in particular with regards durability indicators (gas permeability, chloride diffusion) and mechanical long-term behaviour (creep and shrinkage). Three potential degradation mechanisms have been selected for the CMC system after an environmental analysis: acid attack, external sulphate attack and salt crystallisation. Laboratory accelerated tests highlighted that CEM III/C cement, actually used by MENARD, is suitable in most of the cases. The low C3A content of this binder reduces the production of expansive products in the case of external sulphate attack and its limited clinker hydrates proportions (in particular in portlandite), along with the low C/S ratio of the C-S-H enhance the resistance to acid attack. Salt crystallisation through capillary rise primarily depends on the porous network characteristics and less on the cement ones, meaning that CEM III/C cement is less relevant in that specific case. Based on the tested degradation mechanisms, incorporating rubber aggregates or expended clay ones into the cementitious composites does not significantly affect their durability. Most of the application degradation phenomenon being linked to the ingress of aggressive agents into the composites; the prediction of their diffusive properties is crucial to assess the risks involved for the application. A new predictive model is proposed with a dual homogenisation process: the first one at the cement paste level and the second one on the mortar level. Predicted results are in agreement with ones from experimental tests with a relative error less than 15%. Diffusion coefficient estimates are globally better for composites that contain expended clay aggregates than those incorporating rubber aggregates due to spherical shape of the first in accordance with the model hypotheses.
514

A shoulder-surfing resistant graphical password system

Alesand, Elias, Sterneling, Hanna January 2017 (has links)
The focus of this report is to discuss graphical password systems and how they can contribute to handle security problems that threaten authentication processes. One such threat is shoulder-surfing attacks, which are also reviewed in this report. Three already existing systems that are claimed to be shoulder-surfing resilient are described and a new proposed system is presented and evaluated through a user study. Moreover, the system is compared to the mentioned existing systems to further evaluate the usability, memorability and the time it takes to authenticate. The user study shows that test subjects are able to remember their chosen password one week after having registered and signed in once. It is also shown that the average time to sign in to the system after five minutes of practice is within a range of 3.30 to 5.70 seconds. The participants in the experiments gave the system an average score above 68 on the System Usability Scale, which is the score of an average system.
515

Different Approaches to Model Cover-Cracking of RC Structures due to Corrosion

Roshan, Arman January 2018 (has links)
This thesis presents three different approaches to model corrosion-induced crack propagation in reinforced concrete structures. The first approach is solved numerically using finite differences to model the softening behaviour of concrete in tension. The second approach idealizes the concrete cover as either a brittle elastic or an elastoplastic material so that it may be solved using a closed-form solution. Both approaches are based on a thick-walled cylinder (TWC) analogy and consider rust compressibility and rust diffusion into cracks. The third approach uses finite element modelling to validate the application of the TWC and perform a parametric study. The results obtained using each approach are compared against each other as well as against experimental results. The TWC was found to be an appropriate analogy for the geometries and reinforcement configurations considered. Analytical models were found to provide upper and lower limits to the results based on the numerical model. The experimental data found in the literature showed reasonable agreement with predictions from the numerical and elastoplastic models.
516

Nový MHP rámec pro kybernetickou válku / New IHL Framework for Cyber Warfare

Knopová, Eva January 2016 (has links)
NEW IHL FRAMEWORK FOR CYBER WARFARE - ABSTRACT Regarding the increasing number of revealed cyber-attacks aimed at public facilities including the governmental ones by who seems to be other state actors, this thesis aims to reveal the major importance of cyber warfare, point out the fatal vacuum regarding the IHL framework currently in force and suggests its completion by a new IHL convention, which would regulate cyberwarfare in International Armed Conflicts. In order to provide a well-structured and pertinent arguments to support its main points, the thesis uses methods of qualitative analysis of the current IHL sources including international treaties, customary law and work of the main institutions of international justice along with work of judicial scholars and cyber experts. The work contains five main chapters. The first chapter presents the underlining principles of Laws of Wars, including its theory, history and development; and focuses on one of its three main regimes - the International Humanitarian Law. The second part is dedicated to the topic of cyber warfare, defines its scope as computer network attacks, explains their classification system, analyses their effects and provides examples of such attacks. The third chapter focuses on the issue of the current legal vacuum in relation to cyber...
517

Secure Quantum Encryption

St-Jules, Michael January 2016 (has links)
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to the foundational result by Goldwasser and Micali. Private- and public-key quantum encryption schemes are also constructed from quantum-secure cryptographic primitives, and their security is proven. Most of the results are in the joint paper Computational Security of Quantum Encryption, to appear in the 9th International Conference on Information Theoretic Security (ICITS2016).
518

Architektura a správa zabezpečených sítí / Architecture and management of secure networks

Štangler, Jan January 2020 (has links)
This work is focused on the security of small to medium-sized networks with central administration, especially on the creation of a methodology for secure network design.The design of a secure network for a start-up IT company, using open-source software, is described. Deployment of the designed secure network, with central management, is performed and the connectivity of network elements are tested. The model simulates network traffic situations and network attacks using penetration testing techniques. In terms of the severity of the impact on network security, intercepted attacks are evaluated and immediately reported to responsible persons. Finally, the results of the intercepted attacks are processed and further actions are recommended.
519

Zabezpečení bezdrátových sítí / Wireless Network Security

Sedlák, Břetislav January 2009 (has links)
Master thesis focuses on wireless network security. The thesis is divided in two parts. First part describes today’s used standards and their components, topology and security methods as stealth SSID, MAC addresses filtration, WEP, WPA and WPA2. The last three methods are described in detail. In second part there are realized attacks on above described methods of security. There are described attacks on WEP as KoreK chopchop attack, fragment attack, attack FMS, KoreK and attack PTW. Then is described the dictionary attack on passphrase by WPA/WPA2 with PreShared Key authentication obtaining, precomputed hash tables for faster passphrase finding and for using more core procesors during dictionary browsing. The last attack describes obtaining of keystream used for encrypting of frames by WPATKIP and then sending custom data to client. It is described how to carry out each attack and how to protect against them.
520

Určení pozice útočníka při pokusu o neoprávněný přístup do operačního systému / Location of attacker attempting unauthorized access to operating system

Pokorný, Josef January 2013 (has links)
My master thesis estimates physical location of potential operating system attacker. It deals with basic methods of attack against operating system: spam and viruses, searching the Internet, port scanning and operating system detection. The thesis disserts about a port scanner Nmap, a port scanning detector Scanlogd and about a system log watch Swatch. The thesis deals with geolocation methods of potential operating system attacker. These geolocation methods are divided into an active and a passive types. The active methods measure delay in the Internet. The passive methods query the database. I mentioned a freely accessible Whois database and MaxMind databases. There is a program developed and practically tested. The program simulates an attacker beginning an attack by scanning ports of target machine. The program works with dataset of real IP addresses. The program also detects the attack against operating system. The real and evaluated location of an attacker is got and then shown in a map. At the end there is a review of results and data comparison with colleagues.

Page generated in 0.5002 seconds