• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 428
  • 49
  • 43
  • 27
  • 23
  • 19
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 768
  • 234
  • 166
  • 159
  • 154
  • 141
  • 131
  • 89
  • 82
  • 81
  • 80
  • 78
  • 75
  • 74
  • 72
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Intrusion Detection and Prevention in IP Based Mobile Networks

Tevemark, Jonas January 2008 (has links)
<p>Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks against PRAN broadens. This thesis provides information on what protection an Intrusion Prevention System (IPS) can add to the current PRAN solution.</p><p>A risk analysis is performed to identify assets in and threats against PRAN, and to discover attacks that can be mitigated by the use of an IPS. Information regarding placement of an IPS in the PRAN network is given and tests of a candidate system are performed. IPS features in hardware currently used by Ericsson as well as missing features are pinpointed . Finally, requirements for an IPS intended for use in PRAN are concluded.</p>
252

Restoring the phoenix pastoral care and preaching --post 9/11 as a concept for ministry /

Schiesswohl, Scott J. January 2006 (has links)
Project (D. Min.)--Iliff School of Theology, 2006. / Includes abstract. Includes bibliographical references (leaves 121-123; 126-146).
253

Posttraumatic stress disorder symptoms and the substance use following September 11th /

Nevins, Heather Marie. January 2003 (has links) (PDF)
Thesis (M.A.)--University of North Carolina at Wilmington, 2003.
254

Decision making in U.S. foreign policy applying Kingdon's multiple streams model to the 2003 Iraq crisis /

Saikaly, Ramona. January 2009 (has links)
Thesis (Ph.D.)--Kent State University, 2009. / Title from PDF t.p. (viewed Nov. 24, 2009). Advisor: Steven W. Hook. Keywords: proactive foreign policy, the multiple streams model, preexisting solutions. Includes bibliographical references (p. 218-238).
255

Who were the fifteen Saudis? /

Piechot, Martin F. January 2003 (has links) (PDF)
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Maria J. Rasmussen, James A. Russell. Includes bibliographical references (p. 61-62). Also available online.
256

Walls and fences : the making of good neighbors?!

El Nakhala, Doaa' Hamdi 27 June 2014 (has links)
While the Europeans were discussing integration, other nations experienced long conflicts over borders. In some of the latter contexts, the significance of borders was underscored by escalated border policing through the erection of barriers. Although barrier construction is not a new phenomenon, an increasing number of nation-states are launching barrier projects along their borders. While in all cases the concerned nation-states claimed these barriers were provided security, scant attention was given to the actual security outcomes of these constructions. This research provides answers to the questions: what accounts for the different security outcomes of border barriers? How can barriers differ? And why? How does variation in barriers affect the nature and number of non-state actors' attacks? When do violent groups have tactical shifts and tactical innovations in the context of a barrier? This work moves beyond the conventional perspective on barriers that see them as successful defensive security measures. Instead, it develops the Fortification-Cooperation model that explains why the level of cross-border militant attacks change, when violent groups shift their tactics and when they innovate. I argue that security cooperation on both sides the border limits violent activities locally, which in turn restricts their access to militant resources. Presence of these resources is central for launching more attacks and for introducing tactical innovations. In turn, barriers impose restrictions to movement and increase the cost of certain attack. In this context, motivated violent groups substitute their commonly employed attack tactics for other types of attacks that can be sustained despite the presence of the barrier. Using a newly constructed qualitative and quantitative datasets on Palestinian attacks against Israel and barrier construction between 1990 and 2010, this study finds that the empirical record does not provide support the existing common explanations about the outcomes of barriers and that the interaction of cross-border cooperation and fortification is a key determinant of the number and nature of cross-border militant attacks. This work has significant implications for many states that built, are building, or are considering the construction of barriers on their borders since according to this research, a barrier without cross-border security cooperation would not be efficient at diminishing or decreasing cross-border violence. Additionally, violent groups' access to military resources is an important factor that should be taken into consideration when a barrier is built. Again, cross-border cooperation plays an essential role in restricting these resources, which would lead to less violence. In fact, in some cases, cooperation alone may result in similar outcomes to the combination of fortification and cooperation, which raises questions about the utility of barriers to begin with. / text
257

Racial profiling in the Black and mainstream media : before and after September 11

Moody-Hall, Mia Nodeen 28 April 2015 (has links)
This study examined how mainstream and black press newspapers framed the phenomena of "racial profiling" three years before and three years after the September 11 terrorist attacks. It looked particularly at frames, ethnic groups, source selection and article emphasis. Results indicate that even in the face of a tragedy, black press reporters did not waiver in their position and continued to cover issues from a "black perspective." On the other hand, mainstream newspapers altered their coverage during the high-stress period and began to portray racial profiling as an anti-Arab/terrorist tactic that is acceptable in some cases. This study helps answer the question of whether black press newspapers are necessary in today's society. The answer is yes. They still carry a unique viewpoint. Until the gap that divides African American and other readers ceases to exist, the black press will remain an important staple in the black community. / text
258

Music, publics, and protest: the cultivation of democratic nationalism in post-9/11 America

Foster, Lisa Renee 28 August 2008 (has links)
Not available / text
259

Προστασία συστημάτων από κατανεμημένες επιθέσεις στο Διαδίκτυο / Protecting systems from distributed attacks on the Internet

Στεφανίδης, Κυριάκος 17 March 2014 (has links)
Η παρούσα διατριβή πραγματεύεται το θέμα των κατανεμημένων επιθέσεων άρνησης υπηρεσιών στο Διαδίκτυο. Αναλύει τα υπάρχοντα συστήματα αντιμετώπισης και τα εργαλεία που χρησιμοποιούνται για την εξαπόλυση τέτοιου είδους επιθέσεων. Μελετά τον τρόπο που οργανώνονται οι επιθέσεις και παρουσιάζει την αρχιτεκτονική και την υλοποίηση ενός πρωτότυπου συστήματος ανίχνευσης των πηγών μιας κατανεμημένης επίθεσης άρνησης υπηρεσιών, καθώς και αντιμετώπισης των επιθέσεων αυτών. Τέλος, ασχολείται με το θέμα της ανεπιθύμητης αλληλογραφίας ως μιας διαφορετικού είδους επίθεση άρνησης υπηρεσιών και προτείνει ένα πρωτότυπο τρόπο αντιμετώπισής της. / In our thesis we deal with the issue of Distributed Denial of Service attacks on the Internet. We analyze the current defense methodologies and the tools that are used to unleash this type of attacks. We study the way that those attacks are constructed and organized and present a novel architecture, and its implementation details, of a system that is able to trace back to the true sources of such an attack as well as effectively filter such attacks in real time. Lastly we deal with the issue of spam e-mail as a different form of a distributed denial of service attack and propose a novel methodology that deals with the problem.
260

Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές / Secure service provision through trusted infrastructures

Αντωνόπουλος, Αλέξανδρος 17 March 2014 (has links)
H διατριβή αντιμετωπίζει το πρόβλημα της σχεδίασης ασφαλών υποσυστημάτων που μπορούν να υπάρξουν σε μη-εμπιστεύσιμα συστήματα διασφαλίζοντας τη δική τους ασφάλεια στο μεγαλύτερο δυνατό βαθμό. Στα πλαίσια της διατριβής προσεγγίστικε το πρόβλημα της ασφάλειας γενικά εντοπίζοντας παράλληλα περιοχές οι οποίες κρίθηκαν σημαντικές για περαιτέρω διερεύνηση. Αρχικά παρουσιάζεται η μεθοδολογία που ακολουθήθηκε για το σχεδιασμό και την ανάπτυξη αρχιτεκτονικής ασφάλειας για ένα δικτυο-κεντρικό σύστημα. Εστιάζοντας στα ενσωματωμένα συστήματα εξετάστηκαν θέματα απόδοσης κρυπτογραφίας μνήμης δεδομένου ότι η κρυπτογραφία μνήμης αποτελεί βασικό κομμάτι για την ασφάλεια ενός ενσωματωμένου συστήματος. Στη συνέχεια εξετάζεται ένα είδος επίθεσης πλαγίου καναλιού και εισάγεται μια μεθοδολογία προστασίας από μια τέτοια επίθεση. Δεδομένου ότι θέματα ασφαλείας που υπάρχουν σε συστήματα γενικού σκοπού μπορούν να αποτελέσουν μελλοντικούς κινδύνους για συστήματα ενσωματωμένου σκοπού παράλληλα με την επίβλεψη/υποστήριξη διπλωματικών εργασιών αναπτύχθηκαν λύσεις για ασφαλή εκκίνηση όπως και για τον εντοπισμό και αφαίρεση rootkit. Τέλος ως «τελευταίο» επίπεδο και δεδομένου ότι όλα τα συστήματα χρησιμοποιούνται για την ποιοτική και ασφαλή λειτουργία μιας υπηρεσίας, η διατριβή εστίασε σε θέματα ασφαλειας στο επίπεδο των εφαρμογών. Παρουσιάζεται μια μελέτη του Spam και μεθοδολογία καταπολέμησης του και τέλος επιθέσεις cross-scripting και εφαρμογή για την ανίχνευση μη επιθυμητών συναλλαγών που πραγματοποιούνται από κακόβουλες εφαρμογές. / This dissertation addresses the problem of designing secure subsystems that can exist in non-trusted infrastructures ensuring their own safety to the greatest extent possible. The problem of security was approached in a holistic view identifying areas important for further investigation. Initially we present the methodology used for the design and development of the security architecture for a network-centric system. Later we focus on embedded systems were the performance of memory encryption was examined, since memory encryption can be crucial for embedded system security. Side- channel attacks are also presented and a methodology for protection against such attacks is presented. Keeping in mind that the increase in power in embedded systems makes even more complicated attacks possible solutions were developed for secure boot and for identifying and removing rootkit. At last "last" and with the idea that all sub-systems are used for the qualitative and safe operation of a service, dissertation focused on security issues at the application level. A study of Spam is presented along with a fight-back methodology. Finally cross-scripting attacks are presented.

Page generated in 0.0371 seconds