• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 533
  • 89
  • 70
  • 53
  • 27
  • 25
  • 18
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 5
  • 3
  • Tagged with
  • 1064
  • 391
  • 315
  • 308
  • 232
  • 195
  • 184
  • 179
  • 132
  • 120
  • 114
  • 111
  • 108
  • 88
  • 86
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

Aspectos da crítica teatral brasileira na era digital

Mello, Helena Maria January 2010 (has links)
Depuis les dernières décenies, la critique théâtrale perd de la place dans les médias traditionnels, remplacée par des rubriques et agendas de services qui priorisent, surtout, les aspects comerciaux. Pendant ce temps, le théâtre a subit des extraordinaires transformations et les propositions céniques ont abrité à part le texte, beaucoup d'autres éléments céniques, plutôt visuels, ce qui difficulte et exige l'approfondissement de son analyse. L'apparition de l'internet a permis la propagation d'une grande quantité d'opinions sur le faire artistique théâtral. Chaque jour, des nouveaux blogs et sites se mélangent à la manière comme les gens produisent et recherchent des renseignements culturels et, puisque les moyens virtuels ne présentent ni censure ni les mêmes restrictions de ceux de la presse, les possibilités de dialogue s'élargissent. Cette recherche vérifie de quelle manière les tecnologies les plus récentes interfèrent dans l'élaboration de critiques, identifie les espaces qui leur sont destinées et investigue les opinions des profissionnels de théâtre et de tecnologie de l' information au Brésil, aussi bien que des critiques sur son extention et instantanété dans le web. / Nas últimas décadas, a crítica teatral perdeu espaço nos meios tradicionais de comunicação, substituída por colunas de serviços ou meras indicações de roteiro que priorizam, sobretudo, os aspectos comerciais. Neste mesmo período, o teatro sofreu extraordinárias transformações e as propostas cênicas passaram a abrigar além do texto, muitos outros elementos cênicos, com reforço da visualidade, dificultando e tornando necessário o adensamento de sua análise. O surgimento da internet permitiu a propagação de uma grande quantidade de opiniões sobre o fazer artístico teatral. A cada dia, novos blogs e sites se misturam a maneira como as pessoas produzem e pesquisam informações culturais e, visto que os meios virtuais não apresentam nem a censura, nem as mesmas restrições da imprensa, dilatam, assim, as possibilidades de diálogo. Esta pesquisa verifica de que forma as recentes tecnologias interferem na elaboração de críticas, identifica os espaços a estas destinados no Brasil e investiga as opiniões dos profissionais de teatro e de tecnologia da informação, bem como dos críticos, sobre sua abrangência e instantaneidade na web.
172

Active offensive cyber situational awareness : theory and practice

Al-Shamisi, Ahmed January 2014 (has links)
There is an increasing gap between the progress of technological systems and the successful exploitation of these systems through cyber-attack. Whilst the mechanism and scope of cyberspace is progressing with each passing day, risk factors and the ability to process the required amount of data from cyberspace efficiently are proving to be major obstacles to achieving desired outcomes from cyber operations. This, coupled with the dramatic increase in the numbers of cyber attackers, who are constantly producing new ways of attacking and paralysing cyber systems for political or financial gain, is a critical issue for countries that have linked their major infrastructures with Internet applications. The defensive methods currently applied to counter these evolving attacks are no longer sufficient, due to their preventive and reactive nature. This research has developed a new Active Situational Awareness theoretical model for Active Defence that aims to enhance the agility and quality of cyber situational awareness in organisations in order to counter cyber attacks. Situational Awareness (SA) is a crucial component in every organisation. It helps in the assessment of an immediate situation in relation to the environment. Current SA models adopt a reactive attitude, which responds to events and works in passive manner to any progressing enemy cyber attack. This creates a defensive mind-set and consequently influences the operator to process and utilise knowledge only within the concept of attack prevention. Thus, one can assume that operators will only gather certain knowledge after the occurrence of an attack, instead of actively searching for new intelligence to create new knowledge about the cyber attack before it takes place. This research study introduces a new approach that incorporates an Active Defence posture; namely, a ‘winning attitude’ that conforms to the military stratagems of Sun Tzu, where operators always engage attackers directly in order to create new knowledge in an agile manner by deploying active intelligence-gathering techniques to inform active defence postures in cyberspace. This also allows the system being protected to remain one step ahead of the attackers to ultimately defeat them and thwart any costly attacks. To back these statements, this study issued a survey to 200 cyber defence and security experts in order to collect data on their opinions concerning the current state of Active SA. Structural Equation Modelling (SEM) was then employed to analyse the data gathered from the survey. The results of the analysis revealed significant importance of Active Offensive Intelligence gathering in enhancing Cyber SA. The SEM showed there is a significant impact on SA Agility and Quality from Active Intelligence gathering activities. Further to this, the SEM results informed the design of the serious gaming environments utilised in this research to verify the SEM causality model. Also, the SEM informed the design of a SA assessment metric, where a behavioural anchor rating scale was used along with ground truth to measure participant SA performance. The results of this experiment revealed that there was 2 times better enhancement in cyber Situational awareness among those who did utilise active measures compared with participants who did not which mean almost double and this shows the importance of offensive intelligence gathering in enhancing cyber SA and speed up defender decision making and OODA loop. This research provided for the first time a novel theory for active cyber SA that is aligned with military doctrine. Also, a novel assessment framework and approaches for evaluating and quantifying cyber SA performance was developed in this research study. Finally, a serious gaming environment was developed for this research and used to evaluate the active SA theory which has an impact on training, techniques and practice Deception utilisation by Active groups revealed the importance of having deception capabilities as part of active tools that help operators to understand attackers’ intent and motive, and give operators more time to control the impact of cyber attacks. However, incorrect utilisation of deception capabilities during the experiment led operators to lose control over cyber attacks. Active defence is required for future cyber security. However, this trend towards the militarisation of cyberspace demands new or updated laws and regulations at an international level. Active intelligence methods define the principal capability at the core of the new active situational awareness model order in to deliver enhanced agility and quality in cyber SA.
173

Aspectos da crítica teatral brasileira na era digital

Mello, Helena Maria January 2010 (has links)
Depuis les dernières décenies, la critique théâtrale perd de la place dans les médias traditionnels, remplacée par des rubriques et agendas de services qui priorisent, surtout, les aspects comerciaux. Pendant ce temps, le théâtre a subit des extraordinaires transformations et les propositions céniques ont abrité à part le texte, beaucoup d'autres éléments céniques, plutôt visuels, ce qui difficulte et exige l'approfondissement de son analyse. L'apparition de l'internet a permis la propagation d'une grande quantité d'opinions sur le faire artistique théâtral. Chaque jour, des nouveaux blogs et sites se mélangent à la manière comme les gens produisent et recherchent des renseignements culturels et, puisque les moyens virtuels ne présentent ni censure ni les mêmes restrictions de ceux de la presse, les possibilités de dialogue s'élargissent. Cette recherche vérifie de quelle manière les tecnologies les plus récentes interfèrent dans l'élaboration de critiques, identifie les espaces qui leur sont destinées et investigue les opinions des profissionnels de théâtre et de tecnologie de l' information au Brésil, aussi bien que des critiques sur son extention et instantanété dans le web. / Nas últimas décadas, a crítica teatral perdeu espaço nos meios tradicionais de comunicação, substituída por colunas de serviços ou meras indicações de roteiro que priorizam, sobretudo, os aspectos comerciais. Neste mesmo período, o teatro sofreu extraordinárias transformações e as propostas cênicas passaram a abrigar além do texto, muitos outros elementos cênicos, com reforço da visualidade, dificultando e tornando necessário o adensamento de sua análise. O surgimento da internet permitiu a propagação de uma grande quantidade de opiniões sobre o fazer artístico teatral. A cada dia, novos blogs e sites se misturam a maneira como as pessoas produzem e pesquisam informações culturais e, visto que os meios virtuais não apresentam nem a censura, nem as mesmas restrições da imprensa, dilatam, assim, as possibilidades de diálogo. Esta pesquisa verifica de que forma as recentes tecnologias interferem na elaboração de críticas, identifica os espaços a estas destinados no Brasil e investiga as opiniões dos profissionais de teatro e de tecnologia da informação, bem como dos críticos, sobre sua abrangência e instantaneidade na web.
174

Design and Synthesis of a Hierarchical Hybrid Controller for Quadrotor Navigation

January 2016 (has links)
abstract: There has been exciting progress in the area of Unmanned Aerial Vehicles (UAV) in the last decade, especially for quadrotors due to their nature of easy manipulation and simple structure. A lot of research has been done on achieving autonomous and robust control for quadrotors. Recently researchers have been utilizing linear temporal logic as mission specification language for robot motion planning due to its expressiveness and scalability. Several algorithms have been proposed to achieve autonomous temporal logic planning. Also, several frameworks are designed to compose those discrete planners and continuous controllers to make sure the actual trajectory also satisfies the mission specification. However, most of these works use first-order kinematic models which are not accurate when quadrotors fly at high speed and cannot fully utilize the potential of quadrotors. This thesis work describes a new design for a hierarchical hybrid controller that is based on a dynamic model and seeks to achieve better performance in terms of speed and accuracy compared with some previous works. Furthermore, the proposed hierarchical controller is making progress towards guaranteed satisfaction of mission specification expressed in Linear Temporal Logic for dynamic systems. An event-driven receding horizon planner is also utilized that aims at distributed and decentralized planning for large-scale navigation scenarios. The benefits of this approach will be demonstrated using simulations results. / Dissertation/Thesis / Masters Thesis Computer Science 2016
175

Contributions of honeyports to network security

Pepakayala, Sagar January 2007 (has links)
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. There are many advantages of this technology, like, information about attacker's tools and techniques can be fingerprinted, malicious traffic can be diverted away from the real target etc. With the increased activity from the blackhat community day by day, honeypots could be an effective weapon in the network security administrator's armor. They have been studied rigorously during the past few years as a part of the security industry's drive to combat malicious traffic. While the whitehats are trying to make honeypots stealthier, blackhats are coming up with techniques to identify them (therefore nullifying any further use) or worse, use them in their favor. The game is on. The goal of this thesis is to study different architectural issues regarding honeypot deployment, various stages in utilizing honeypots like forensic analysis etc. Other concepts like IDSs and firewalls which are used in conjunction with honeypots are also discussed, because security is about cooperation among different security components. In the security industry, it is customary for whitehats to watch what blackhats are doing and vice versa. So the thesis discusses recent techniques to defeat honeypots and risks involved in deploying honeypots. Commercial viability of honeypots and business cases for outsourcing honeypot maintenance are presented. A great interest from the security community about honeypots has propelled the research and resulted in various new and innovative applications of honeypots. Some of these applications, which made an impact, are discussed. Finally, future directions in research in honeypot technology are perused.
176

Smart Infrastructure Visualization / Smart Infrastructure Visualization

Filípek, Tomáš January 2016 (has links)
Computational power of mobile devices has been continuously improving in the recent years. One of the benefits which it brings, is feasibility of new kinds of distributed systems, such as Ensemble-Based Component Systems (EBCS). For practical reasons, EBCS systems are usually tested using simulations before being released. However, it can be difficult to interpret the simulation output, as it is usually contained in XML format, which is more suited to be read by machines than by people. We provide a visualizing application, which creates a graphical representation of such a simulation output. Out of the box, it is able to visualize data from applications built on top of the JDEECo component model, but it can be easily modified to accept output from different EBCS applications. It is able to visualize both components and ensembles and provides a scripting interface to modify the graphical output. In addition, it has an extensibility mechanism for adding new functionalities. Our benchmarking shows that the application is expected to run reasonably fast in typical scenarios.
177

Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities

Li, Weifeng, Li, Weifeng January 2017 (has links)
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and more. However, the cybersecurity sector is behind other sectors in benefiting from the business intelligence offered by social media analytics. Given the role of hacker communities in cybercrimes and the prevalence of hacker communities, there is an urgent need for developing hacker social media analytics capable of gathering cyber threat intelligence from hacker communities for exchanging hacking knowledge and tools. My dissertation addressed two broad research questions: (1) How do we help organizations gain cyber threat intelligence through social media analytics on hacker communities? And (2) how do we advance social media analytics research by developing innovative algorithms and models for hacker communities? Using cyber threat intelligence as a guiding principle, emphasis is placed on the two major components in hacker communities: threat actors and their cybercriminal assets. To these ends, the dissertation is arranged in two parts. The first part of the dissertation focuses on gathering cyber threat intelligence on threat actors. In the first essay, I identify and profile two types of key sellers in hacker communities: malware sellers and stolen data sellers, both of which are responsible for data breach incidents. In the second essay, I develop a method for recovering social interaction networks, which can be further used for detecting major hacker groups, and identifying their specialties and key members. The second part of the dissertation seeks to develop cyber threat intelligence on cybercriminal assets. In the third essay, a novel supervised topic model is proposed to further address the language complexities in hacker communities. In the fourth essay, I propose the development of an innovative emerging topic detection model. Models, frameworks, and design principles developed in this dissertation not only advance social media analytics research, but also broadly contribute to IS security application and design science research.
178

The role of awareness in adoption of government cyber security initiatives : A study of SMEs in the U.K.

Topping, Colin January 2017 (has links)
Awareness is a key component of any information security programme. This study sets out to establish whether SMEs are using the government cyber security initiatives and finds that only 4.3% of respondents are utilising the resource that is freely available from the newly formed National Cyber Security Centre. The principal reason for this is a lack of awareness, although the survey also reveals that respondents would use this service if they had knowledge of it. Furthermore, 72.3% are keen for the government to deliver a public cyber security awareness campaign from funds available to the National Cyber Security Strategy. The association of the NCSC with GCHQ is seen to increase the trust in the service the NCSC delivers, whilst incentivising SMEs to enhance their security is popular amongst the 46 respondents. Survey responses suggest that small and micro businesses believe that they are too small to attract cyber-attacks, under the misguided assumption that “security through obscurity” is a viable control to mitigate the cyber risk. This underlines the lack of awareness of the randomness of threats such as ransomware and supports the need for greater user knowledge.
179

The effectiveness of the principle of distinction in the context of cyber warfare

Van Breda, Leanne Christine 29 May 2014 (has links)
LL.M. (International Law) / Please refer to full text to view abstract.
180

Interdependent Cyber Physical Systems: Robustness and Cascading Failures

Huang, Zhen January 2014 (has links)
The cyber-physical systems (CPS), such as smart grid and intelligent transportation system, permeate into our modern societies recently. The infrastructures in such systems are closely interconnected and related, e.g., the intelligent transportation system is based on the reliable communication system, which requires the stable electricity provided by power grid for the proper function. We call such mutually related systems interdependent networks. This thesis addresses the cascading failure issue in interdependent cyber physical system. We consider CPS as a system that consists of physical-resource and computational-resource networks. The failure in physical-resource network might cause the failures in computational-resource network, and vice versa. This failure may recursively occur and cause a sequence of failures in both networks. In this thesis, we propose two novel interdependence models that better capture the interdependent networks. Then, we study the effect of cascading failures using percolation theory and present the detailed mathematical analysis on failure propagation in the system. By calculating the size of functioning parts in both networks, we analyze the robustness of our models against the random attacks and failures. The cascading failures in smart grid is also investigated, where two types of cascading failures are mixed. We estimate how the node tolerance parameter T (ratio of capacity to initial workload) affect the system performance. This thesis also explores the small clusters. We give insightful views on small cluster in interdependent networks, under different interdependence models and network topologies.

Page generated in 0.0163 seconds