• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 735
  • 350
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 48
  • 31
  • 9
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 1683
  • 1683
  • 269
  • 247
  • 235
  • 207
  • 186
  • 184
  • 173
  • 164
  • 145
  • 137
  • 136
  • 125
  • 124
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

CyberCIEGE scenario illustrating software integrity issues and management of air-gapped networks in a military environment

Chua, Chay 12 1900 (has links)
The importance of Information Assurance (IA) in military operations cannot be overstated. It is a sine qua non that achieving IA requires the effort of all personnel in the organization; just a single untrained end-user is needed to defeat many well thought-out and well-executed security strategies This thesis demonstrated that CyberCIEGE, with its rich elements and tools, can be used to create game scenarios, mimicking real life IA issues, for conveying security lessons to a wide audience of trainees. It provides an excellent alternative to the traditional methods of security education which so often fail in driving home the intended lessons. A military-based CyberCIEGE scenario definition file (SDF) was developed to illustrate and train players on the importance of ensuring hardware and software integrity in operational-critical systems. The focus of the research was on the protection of sensitive information systems through the maintenance of their software integrity and the application of an airgapped network architecture. The test cases developed in this thesis research also contributed to the improvement of the CyberCIEGE game engine.
182

Taxonomy of spyware and empirical study of network drive-by-downloads

Barwinski, Mark Andrei 09 1900 (has links)
Spyware has rapidly become a major security concern in government and corporate networks as well as for home computers. Spyware is able to circumvent common security practices, funneling information to remote parties and consuming system resources with impunity. This malicious software has infiltrated common search engines and Internet sectors generally considered "safe." Making use of browser vulnerabilities, spyware infection is wide-spread. This thesis considers common infection vectors and reviews current definitions in arriving at an improved definition of spyware. It identifies four common activities present in all spyware which lead to multiple behavioral capabilities. An empirical analysis of network drive-by-downloads shows the presence of spyware in bank, online travel, and real estate-related Internet sectors. The impact of system security patch maintenance on spyware susceptibility, and browser differences in the context of drive-by-downloads is also presented.
183

Using open source software in visual simulation development

Salvatore, Ricardo Brigatto 09 1900 (has links)
The convergence between personal computer-based games and virtual environments technologies dramatically reduced development costs and potentially increased the use of the technology in training activities. Using open source/free software tools in the process can expand these possibilities, resulting in even greater cost reduction and allowing the flexibility needed in a training environment. This thesis presents a configuration and architecture to be used when developing training visual simulations using both personal computers and open source tools. Aspects of the requirements needed in a visual simulation development, processes to develop an application and issues related to the use, licensing and selection of open source/free software are analyzed to identify their limitations and possibilities. This architecture was tested by developing a small visual simulation. The tools and engine used are presented to enable any future project applying open source software to follow similar procedures.
184

High throughput tactical wireless networking for surveillance and targeting in a coalition environment an analysis of the next generation IEEE 802.11n equipment and standard

Thomason, Gary W. 09 1900 (has links)
This thesis presents a technology review of the emerging IEEE 802.11n standard. A wireless local area network (WLAN) based on state-of-the-art equipment supporting the 802.11n protocol is evaluated in the Coalition Operating Area Surveillance and Targeting System (COASTS). This thesis also provides a brief introduction to COASTS, its support for testing various networking schemes, and their effectiveness in supplying information necessary to reach a decision maker's desired end-state. Also provided is a summary of the current state of the 802.11n proposed standard, the hardware and software used to evaluate the equipment, and the testing methodology. In general, the methodology was to conduct field tests with private vendors and coalition partners to evaluate the capabilities of 802.11n networks that promise large throughput benefits for WLANs. The specific goal of this research focused on testing equipment and network configurations in an IP network. The ultimate goal of this research is to evaluate an evolutionary improvement for our forces to transfer large amounts of data and to maintain the mobility and flexibility to deploy rapidly to areas with little or no infrastructure. With this capability our forces may can gain control of the environment, dramatically improve tactical situational awareness, and attain information superiority.
185

Documentation and testing of the WEAP model for the Rio Grande/Bravo Basin

Danner, Constance L. 08 1900 (has links)
ces. This report falls under Task 3 of the project by documenting and testing the basin-wide model constructed using WEAP software. The documentation of the model addresses all of the inputs for demands and supplies for the river. The model is also set up to include operating polices of the different countries and how they each allocate water to their demands. The supplies in the model include tributary inflows, as well as reservoir and groundwater storage. This report is the first of many testing phases. The two items that were evaluated here, by comparing them against historical records, were the reservoir storage volumes and the streamflow for six IBWC gages. This testing demonstrated that the model has the right logic and flow pattern, however adjustments need to be made to the reservoir releases in order to fully represent the existing system. / Contract number: N62271-97-G-0073. / US Navy (USN) author.
186

Wireless sensor network channel propagation measurements and comparison with simulation

Alzaghal, Mohamad H. 06 1900 (has links)
Wireless Sensor Networks (WSNs) is an important field of study as more and more applications are enhancing daily life. The technology trend is to achieve small-sized, cheap, and power efficient sensor nodes, which will make the system reliable and efficient. The Crossbow Technologies MICAz mote is an example used in this thesis. Measurements for its propagation characteristics in a realistic environment will help the deployment and installation of these motes to form a WSN. The CST Microwave Studio is used to build a simulation for the MICAz. The Rhino software is used to build Spanagel Hall, which is the location of the simulation. All of these elements are integrated in Urbana. Urbana is a simulation tool used to simulate the propagation decay around the mote and investigate the irregularity of the electromagnetic field for the indoor environment of the motes. The results and comparisons between empirical and simulated data are intended for assisting in the design and future studies and deployment of WSNs in the real world. / Jordanian Army author.
187

Reducing a complex instruction set computer.

January 1988 (has links)
Tse Tin-wah. / Thesis (M.Ph.)--Chinese University of Hong Kong, 1988. / Bibliography: leaves [73]-[78]
188

Scaling CFL-reachability-based alias analysis: theory and practice. / 擴展基於CFL-Reachability的別名分析 / Scaling context-free language reachability-based alias analysis / CUHK electronic theses & dissertations collection / Kuo zhan ji yu CFL-Reachability de bie ming fen xi

January 2013 (has links)
Zhang, Qirun. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 170-186). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
189

Command processors for the dynamic control of software configurations

Fundis, Roxanna May January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
190

Transforming data flow diagrams to software structure using the Yourdon-Constantine methodology

Antonucci, Franco January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries

Page generated in 0.0316 seconds