• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 533
  • 89
  • 70
  • 53
  • 27
  • 25
  • 18
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 5
  • 3
  • Tagged with
  • 1064
  • 391
  • 315
  • 308
  • 232
  • 195
  • 184
  • 179
  • 132
  • 120
  • 114
  • 111
  • 108
  • 88
  • 86
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

European Aviation Crisis Management

Ahlin, Katarina, Bredin, Sanna January 2013 (has links)
Our aim is to investigate and evaluate the efficiency of crisis management in European aviation, and to recommend enhancements. To fulfill this, we mapped the current crisis management plans and created a fictive scenario where a cyber-attack shut down the power at five of the major airports in Europe. Air traffic in Europe was reconstructed to a chosen day; the 16th of September 2013, and the reconstructed traffic situation was used in the scenario. We also created a model, for the purpose of showing the effect of a cut in time for the steps in the crisis management plan may have on the traffic waiting to depart at the closed airports. When using these means, we could implement the crisis management plans on the fictive scenario and make changes to the plans for a new implementation. The existing crisis management plans were compared to the modified plans made by us, and it was found that usage of a common platform for the different stakeholders involved in the crisis could improve the efficiency of the crisis management.
102

Reconnaissance de forme dans cybersécurité

Vashaee, Ali January 2014 (has links)
Résumé : L’expansion des images sur le Web a provoqué le besoin de mettre en œuvre des méthodes de classement d’images précises pour plusieurs applications notamment la cybersécurité. L’extraction des caractéristiques est une étape primordiale dans la procédure du classement des images vu son impact direct sur la performance de la catégorisation finale des images et de leur classement. L’objectif de cette étude est d’analyser l’état de l’art des différents espaces de caractéristiques pour évaluer leur efficacité dans le contexte de la reconnaissance de forme pour les applications de cybersécurité. Les expériences ont montré que les descripteurs de caractéristiques HOG et GIST ont une performance élevée. Par contre, cette dernière se dégrade face aux transformations géométriques des objets dans les images. Afin d’obtenir des systèmes de classement d’image plus fiables basés sur ces descripteurs, nous proposons deux méthodes. Dans la première méthode (PrMI) nous nous concentrons sur l’amélioration de la propriété d’invariance du système de classement par tout en maintenant la performance du classement. Dans cette méthode, un descripteur invariant par rapport à la rotation dérivé de HOG est utilisé (RIHOG) dans une technique de recherche "top-down" pour le classement des images. La méthode (PrMI) proposée donne non seulement une robustesse face aux transformations géométriques des objets, mais aussi une performance élevée similaire à celle de HOG. Elle est aussi efficace en terme de coût de calcul avec une complexité de l’ordre de O(n). Dans la deuxième méthode proposée (PrMII), nous nous focalisons sur la performance du classement en maintenant la propriété d’invariance du système de classement. Les objets sont localisés d’une façon invariante aux changement d’échelle dans l’espace de caractéristiques de covariance par région. Ensuite elles sont décrites avec les descripteurs HOG et GIST. Cette méthode procure une performance de classement meilleure en comparaison avec les méthodes implémentées dans l’étude et quelques méthodes CBIR expérimentées sur les données Caltech-256 dans les travaux antérieurs. // Abstract : The tremendous growth of accessible online images (Web images), provokes the need to perform accurate image ranking for applications like cyber-security. Fea­ture extraction is an important step in image ranking procedures due to its direct impact on final categorization and ranking performance. The goal of this study is to analyse the state of the art feature spaces in order to evaluate their efficiency in the abject recognition context and image ranking framework for cyber-security applications. Experiments show that HOG and GIST feature descriptors exhibit high ranking performance. Whereas, these features are not rotation and scale invariant. In order to obtain more reliable image ranking systems based on these feature spaces, we proposed two methods. In the first method (PrMI) we focused on improving the invariance property of the ranking system while maintaining the ranking perfor­mance. In this method, a rotation invariant feature descriptor is derived from HOC (RIHOC). This descriptor is used in a top-down searching technique to caver the scale variation of the abjects in the images. The proposed method (PrMI) not only pro­ vides robustness against geometrical transformations of objects but also provides high ranking performance close to HOC performance. It is also computationally efficient with complexity around O(n). In the second proposed method (PrMII) we focused on the ranking performance while maintaining the invariance property of the ranking system. Objects are localized in a scale invariant fashion under a Region Covariance feature space, then they are described using HOC and CIST features. Finally to ob­ tain better evaluation over the performance of proposed method we compare it with existing research in the similar domain(CBIR) on Caltech-256. Proposed methods provide highest ranking performance in comparison with implemented methods in this study, and some of the CBIR methods on Caltech-256 dataset in previous works.
103

Harcèlement scolaire et cyber-harcèlement : étude des violences scolaires chez les élèves français / School bullying and cyberbullying : research among adolescents in France

Hoareau, Natacha 29 November 2018 (has links)
L’un des objectifs de la politique éducative du Ministère de l’Éducation nationale consiste à développer la réussite scolaire et l’épanouissement de chaque élève. Mais cet objectif peut être entravé par des violences scolaires et l’école peut alors devenir un lieu de souffrance pour les élèves. Le harcèlement scolaire peut prendre diverses formes telles que le harcèlement physique, verbal, psychologique et virtuel via les réseaux sociaux et les technologies de communication et d’information (i.e., le cyber-harcèlement). Le harcèlement scolaire et le cyber-harcèlement engendrent de graves conséquences sur le bien-être des élèves, leur santé mentale, physique, leur scolarité, qu’ils soient (cyber)victimes ou (cyber)harceleurs. Ce travail de recherche a eu pour objectif premier d’identifier les facteurs qui amènent les élèves à adopter ou non des conduites de harcèlement au sein de l’école, mais également derrière leurs écrans, à travers plusieurs études à la fois exploratoires et expérimentales. Le second objectif a été de proposer et d’évaluer une action psycho-éducative pour tenter de réduire les comportements agressifs des collégiens en développant une compétence psychosociale essentielle à la promotion de la santé et de l’empathie, par le biais de la technique du jeu de rôle, et ainsi de promouvoir des comportements favorisant un climat scolaire harmonieux. / The ministry of national Education aims at developing educational success and each pupil’s fulfillment. Nevertheless, this aim can be disturbed by school violence, thus turning school into a place of physical and psychological pain for pupils. School bullying can take many forms such as physical, verbal, psychological and virtual (i.e. cyberbullying). A growing body of international research evidence has demonstrated that bullying is associated with negative consequences for both (cyber)bullies and their (cyber)victims. First, this PhD thesis will aim at identifying which factors bring pupils to adopt bullying and cyberbullying behaviors inside the school and which factors don’t. Then, it will offer and evaluate interventions to fight against school bullying improving students’ empathy in order to reduce middle school students’ aggressive behaviors.
104

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
105

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
106

Guerra e ciberespaço : uma análise a partir do meio físico

Leal, Marcelo Mesquita January 2015 (has links)
O presente artigo tem por objetivo demonstrar a importância do meio físico como variável explicativa fundamental para o estudo da ciberguerra. O argumento central desenvolvido afirma que o transporte efetivo de informações no ciberespaço durante a guerra depende da posse de ativos estratégicos que garantam a interconexão entre dispositivos eletrônicos por meio de redes resilientes e seguras, e que a posse, a localização e o controle desses ativos é condição prévia e necessária para a consecução de uma estratégia de defesa cibernética. A partir de um arcabouço teórico clausewitziano e de uma análise de redes em camadas, esse artigo conclui que tanto no plano estratégico (ativos nacionais) quanto no plano operacional e tático (redes militares críticas) o acesso e a livre movimentação no ciberespaço é fortemente dependente do meio físico. / This paper aims to demonstrate the importance of the physical medium as a key explanatory variable for the study of cyberwar. The central argument defends that the effective transport of information in cyberspace during war depends on the possession of strategic assets to ensure the connection between electronic devices via resilient and secure networks, and that the ownership, location and control of these assets is a prior and necessary condition to the achievement of a cyber defense strategy. From a Clausewitzian theoretical framework, and through an analysis of layered network architecture, this paper concludes that in both strategic (domestic assets) and operational and tactical (critical military networks) levels the access and unrestricted movement in cyberspace depends greatly on the physical medium.
107

Kyberšikana / Cyberbullying

Králová, Lucie January 2017 (has links)
The thesis deals with the issue of cyberbullying at the University of Economics in Prague. In the theoretical part is defined cyberbullying, describes the individual elements, specifics, used tools and forms of cyberbullying. There is also described cyberbullying in relation to the law of the Czech Republic and several other countries. The thesis also included the results of several studies and the best-known cases of cyberbullying. The practical part presents the evaluation and analysis of the results of the quantitative research from the University of Economics in Prague. The result is an analysis of the incidence of cyberbullying among students of the university and recommendations on how to behave on the social networks in order to prevent cyberbullying.
108

Towards Cloud-based Vehicular Cyber-physical Systems

Alam, Kazi Masudul January 2017 (has links)
We are living in the age of information technology, where we are fully occupied with the revolutionary innovations of the last few decades such as the Internet, mobile devices, wireless communications, social networks, wearables, cloud computing, etc. While these technologies have become integral part of our daily life, we are now anxiously waiting to embrace Internet-of-Things (IoT), intelligent digital assistants, driver-less cars, drone deliveries, virtual reality, and smart city applications. Recently, research community is demonstrating increasing interests about Cyber-Physical Systems (CPS) that resides in the cross-section of embedded systems, network communications, and scalable distributed infrastructures. The main responsibility of a CPS is to collect sensory data about the physical world and to inform the computation module using communication technologies that processes the data, identifies important insights and notifies back using a feedback loop. These notifications can however be control commands to reconfigure the physical world. Such a setup is a useful method to deploy smart city applications. In this dissertation, we keep our focus onto the smart transport objective using vehicular CPS (VCPS) based systems organization. We have compiled this dissertation with our research contributions in this growing field of VCPS. One of our key contributions in this field is an architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of a CPS: computation, communication and control, while integrating cloud features to it. We have identified various types of computation and interaction modes of this paradigm as well as describe Bayesian network and fuzzy logic based smart connection to select a mode at any time. It is considered that the true adoption of CPS is only possible through the deployment of the IoT systems. Thus, it is important to have IoT as a foundation in the CPS architectures. Our next contribution is to leverage existing Vehicular Adhoc Network (VANET) technologies and map them with the standard IoT-Architecture reference model to design the VCPS, Social Internet-of-Vehicles (SIoV). In this process, we have identified the social structures and system interactions among the subsystems involved in the SIoV. We also present a message structure to facilitate different types of SIoV interactions. The ability of dynamic reconfiguration in a C2PS is very appealing. We capture this feature in the VCPS by designing a model-based reconfiguration scheme for the SIoV, where we measure the data workloads of distinct subsystems involved in various types of SIoV interactions. We further use these models to design dynamic adaptation schemes for the subsystems involved in VCPS interactions. Our final contribution is an application development platform based on C2PS design technique that uses server-client based system communications. In this platform, server side is built using JAVA, client side uses Android, message communication uses JSON and every component has its own MySQL database to store the interactions. We use this platform to emulate and deploy SIoV related applications and scenarios. Such a platform is necessary to continue C2PS related research and developments in the laboratory environment.
109

“Now You See It. Now You Don't”- How Cryptocurrencies Enable Money Laundering

Gonçalves, Maria January 2019 (has links)
Money laundering is a non-violent crime, however when successfully executed it has a negative impact on society, as it tends to support other illicit activities, including terrorism. As was the case for other financial crimes, the internet opened the door for new tools that enable criminals to launder their illicit profits. One of these tools is cryptocurrency.This paper takes the form of a literature review, in order to find the most relevant and important work within the research topic, and to identify central issues associated with laundering money through cryptocurrencies. It aims to explain the crypto-laundering process, methods and features that make cryptocurrencies tempting to criminals when searching tools to launder their illicit profits.The findings of this literature review demonstrate that cryptocurrencies have more characteristics that appeal to launderers than deters them. The results also show the existence of different methods that are employed in crypto-laundering and how it mirrors traditional money laundering stages, making evident that crypto-laundering is a real threat. Due to these results, it is essential that the criminological community delve into financial crimes perpetrated in the online environment.
110

Investigating Cyber Performance: An Individual Differences Study

Kelly Anne Cole (10907916) 04 August 2021 (has links)
<div>The persistent issues that have been identified in the cyber defense domain, such as information-overload, burn-out and high turn-over rates among cyber analysts leads us to question what the cognitive ability contribution is to a more successful cyber performance. Cyber defense researchers theorize that individual differences are determinants of cyber performance success but have yet to establish empirically the role of individual differences. Therefore, the study uses an individual differences approach under a work performance framework to study the contributions of cognitive ability (i.e., attention control) on cyber performance success in a specific cyber work-role (i.e., the Incident Reponder), and through its well-defined primary task (i.e., incident detection system performance). The sample included actual network analysts with a wide range of incident detection expertise, age, and education levels for more reliable and valid scores. The results of the correlational analysis showed that individual differences in attention control (i.e., flexibility and spatial attention) contribute most to the differences in Incident Responder work-performance. A linear regression model then demonstrated that spatial attention and flexibility predict 53 to 60 percent of the variance in cyber performance scores. It is suggested that the KSA's from the NICE framework be updated with the cognitive abilities that contribute to and/or predict cyber performance success, for superior recruitment efforts towards a more efficient cyber defense work-force. </div><div><br></div>

Page generated in 0.0275 seconds